Opportunistic Routing Algorithm for Relay Node Selection in WSN

Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks Energy savings optimization becomes one of the major concerns in the wireless sensor network (WSN) routing protocol design, due to the fact that most sensor nodes are equipped with the limited non rechargeable battery power. Minimizing energy consumption and maximizing network lifetime is focused for data relay in one-dimensional queue network. Following the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency is made based on the differences among sensor nodes, in terms of…

Read More

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks DOWNLOAD PROJECT SYNOPSIS -JAVA DOWNLOAD PROJECT SYNOPSIS -NS2 Wireless sensor networks (WSNs) are resource constrained. Energy is one of the most important resources in such networks. Therefore, optimal use of energy is necessary. A novel energy-efficient routing protocol is proposed for WSNs. The protocol is reliable in terms of data delivery at the base station (BS). Mobility in sensor nodes and in the BS is considered. The proposed protocol is hierarchical and cluster based. Each cluster consists of one cluster…

Read More

Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for VM provisioning and allocation which allow users to submit bids for their requested VMs. Dynamic VM provisioning and allocation problem is studied for the auction-based model as an integer program considering multiple types of resources. Truthful…

Read More

A Lightweight Scheme for Detecting Provenance Forgery and Packet Drop Attacks

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for…

Read More