• Title/Summary/Keyword: Protocol optimization

Search Result 275, Processing Time 0.026 seconds

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks

  • Cai, Xingjuan;Sun, Youqiang;Cui, Zhihua;Zhang, Wensheng;Chen, Jinjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2469-2490
    • /
    • 2019
  • A low-energy adaptive clustering hierarchy (LEACH) protocol is a low-power adaptive cluster routing protocol which was proposed by MIT's Chandrakasan for sensor networks. In the LEACH protocol, the selection mode of cluster-head nodes is a random selection of cycles, which may result in uneven distribution of nodal energy and reduce the lifetime of the entire network. Hence, we propose a new selection method to enhance the lifetime of network, in this selection function, the energy consumed between nodes in the clusters and the power consumed by the transfer between the cluster head and the base station are considered at the same time. Meanwhile, the improved FTBA algorithm integrating the curve strategy is proposed to enhance local and global search capabilities. Then we combine the improved BA with LEACH, and use the intelligent algorithm to select the cluster head. Experiment results show that the improved BA has stronger optimization ability than other optimization algorithms, which the method we proposed (FTBA-TC-LEACH) is superior than the LEACH and LEACH with standard BA (SBA-LEACH). The FTBA-TC-LEACH can obviously reduce network energy consumption and enhance the lifetime of wireless sensor networks (WSNs).

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Fuzzy Logic Approach to Zone-Based Stable Cluster Head Election Protocol-Enhanced for Wireless Sensor Networks

  • Mary, S.A. Sahaaya Arul;Gnanadurai, Jasmine Beulah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1692-1711
    • /
    • 2016
  • Energy is a scarce resource in wireless sensor networks (WSNs). A variety of clustering protocols for WSNs, such as the zone-based stable election protocol-enhanced (ZSEP-E), have been developed for energy optimization. The ZSEP-E is a heterogeneous zone-based clustering protocol that focuses on unbalanced energy consumption with parallel formation of clusters in zones and election of cluster heads (CHs). Most ZSEP-E research has assumed probabilistic election of CHs in the zones by considering the maximum residual energy of nodes. However, studies of the diverse CH election parameters are lacking. We investigated the performance of the ZSEP-E in such scenarios using a fuzzy logic approach based on three descriptors, i.e., energy, density, and the distance from the node to the base station. We proposed an efficient ZSEP-E scheme to adapt and elect CHs in zones using fuzzy variables and evaluated its performance for different energy levels in the zones.

A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network

  • Alattas, Khalid A
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.207-213
    • /
    • 2021
  • Networks in Mobile ad hoc contain distribution and do not have a predefined structure which practically means that network modes can play the role of being clients or servers. The routing protocols used in mobile Ad-hoc networks (MANETs) are characterized by limited bandwidth, mobility, limited power supply, and routing protocols. Hybrid routing protocols solve the delay problem of reactive routing protocols and the routing overhead of proactive routing protocols. The Ant Colony Optimization (ACO) algorithm is used to solve other real-life problems such as the travelling salesman problem, capacity planning, and the vehicle routing challenge. Bio-inspired methods have probed lethal in helping to solve the problem domains in these networks. Hybrid routing protocols combine the distance vector routing protocol (DVRP) and the link-state routing protocol (LSRP) to solve the routing problem.

A Route Optimization Mechanism using an Extension Header in the IPv6 Multihoming Environment (IPv6 멀티호밍 환경에서 확장 헤더를 이용한 경로 최적화 메커니즘)

  • Huh, Ji-Young;Lee, Jae-Hwoon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • A multihomed enterprise or AS(Autonomous System) improves reliability and performance by acquiring its Internet connectivity from more than two ISP(Internet Service Provider). Multihoming protocol must allow a multihomed site whose connectivity through one of the ISPs fails to keep its Internet connectivity As one of mechanisms to do this, tunneling mechanism through Non-direct EBGP(Exterior Border Gateway Protocol) is defined. This mechanism makes connectivity to the Internet more reliable, but causes the problem that makes the communication route non-optimal. In this paper, we propose the route optimization mechanism using an extension header in the IPv6 multihoming environment.

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6 (이동 IPv6의 확장된 경로 최적화프로토콜에 대한 형식화된 보안 분석)

  • You, Il-Sun;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.691-699
    • /
    • 2009
  • Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.

TCP Performance Optimization Using Congestion Window Limit in Ad Hoc Networks with MAC Frame Aggregation (MAC Frame Aggregation이 가능한 에드혹 네트워크에서의 Congestion Window Limit을 통한 TCP 성능의 최적화)

  • Kang, Min-Woo;Park, Hee-Min;Park, Joon-Sang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.52-59
    • /
    • 2010
  • MAC frame aggregation is a method that combines multiple MPDUs (MAC protocol data units) into one PPDU (PHY protocol data units) to enhance network performance at the MAC layer. In ad hoc networks, TCP underperforms due to the congestion window overshooting problem and thus by setting CWL (congestion window limit) TCP performance can be improved. In this paper, we investigate the problem of setting CWL for TCP performance optimization in ad hoc networks with MAC frame aggregation.

Performance management of communication networks for computer integrated manufacturing Part ll: Decision making (컴퓨터 통합 샌산을 위한 통신망의 성능관리)

  • Lee, Suk
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.11 no.4
    • /
    • pp.138-147
    • /
    • 1994
  • Performance management of computer networks is intended to improve a given network performance in order for more efficient information exchange between subsystems of an integrated large-scale system. Improtance of performance management is growing as many function of the large- scale system depend on the quality of communication services provided by the network. The role of performance management is to manipulate the adjustable protocol parameters on line so that the network can adapt itself to a dynamic environment. This can be divided into two subtasks : performance evaluation to find how changes in protocol parameters affect the network performance and decision making to detemine the magnitude and direction of parameter adjustment. This paper is the second part of the two papers focusing on conceptual design, development, and evaluation of performance management for token bus networks. This paper specifically deals with the task of decision making which utilizes the principles of stochastic optimization and learning automata. The developed algorithm can adjuxt four timer settings of a token bus protocol based on the result of performance evaluation. The overall performance management has been evaluated for its efficacy on a network testbed.

  • PDF

Route Optimization Scheme using Routing Protocol in Nested Mobile Networks (중첩된 이동 네트워크환경에서 동적 라우팅 프로토콜을 이용한 경로 최적화 기법)

  • Kim, Eui-Kook;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1966-1975
    • /
    • 2008
  • NEMO Basic Support Protocol standardized in IETF provides the seamless communication environment to all nodes within the mobile network regardless of the network movement while the network is moving. According to the standard, when the mobile network moves outside of its home network the network can make use of the binding update message or dynamic routing protocol in order to register the mobility information into the Home Agent(HA). But because these two methods don't consider the route optimization, all packets destined to Mobile Network Nodes(MNNs) attached into the Mobile Router(MR) have to go through HAs of MRs so that they bring on the transmission delay and the waste of the bandwidth. This situation is to be worse and causes the packet fragmentation problem if MRs within the mobile network are nested. Even though there have been some researches about the route optimization to recover the problems, they have problems in the packet transmission performance side. In this paper, we propose a new scheme to improve the network performance by using a dynamic routing protocol and minimizing the number of HAs on the end-to-end path. Various performance evaluations show that the proposed mechanism gives better performance in view of the packet transmission compared to the existing schemes.

A many-objective optimization WSN energy balance model

  • Wu, Di;Geng, Shaojin;Cai, Xingjuan;Zhang, Guoyou;Xue, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.514-537
    • /
    • 2020
  • Wireless sensor network (WSN) is a distributed network composed of many sensory nodes. It is precisely due to the clustering unevenness and cluster head election randomness that the energy consumption of WSN is excessive. Therefore, a many-objective optimization WSN energy balance model is proposed for the first time in the clustering stage of LEACH protocol. The four objective is considered that the cluster distance, the sink node distance, the overall energy consumption of the network and the network energy consumption balance to select the cluster head, which to better balance the energy consumption of the WSN network and extend the network lifetime. A many-objective optimization algorithm to optimize the model (LEACH-ABF) is designed, which combines adaptive balanced function strategy with penalty-based boundary selection intersection strategy to optimize the clustering method of LEACH. The experimental results show that LEACH-ABF can balance network energy consumption effectively and extend the network lifetime when compared with other algorithms.