Rajashekhar C. Biradar
Reva University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Media Access Control in Wireless Sensor Networks using Priority Index Mallanagouda Patil; Rajashekhar C. Biradar
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 2: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i2.pp416-426

Abstract

As the nodes in Wireless Sensor Networks (WSNs) have limited power, energy conservation is essential at different layers of the protocol stack to prolong lifetime. In our previous work, ”Priority based slot allocation for media access in wireless sensor networks” (PSAWSN), probability based priority scheme is used to allocate slots to competing nodes. Limitations of this work include 1) It does not handle dynamic and variable slot allocation based on varying requirements of nodes. 2) Error control is not taken into account. To overcome these limitations, we propose a Medium Access Control scheme using Priority Index (MACPI) that generates Priority Index (PI) to allocate varying slots based on parameters: message length (ML), node energy (NE), number of requests (NR) and message urgency (MU). Models have been de- signed for all these parameters and an expert system is proposed that makes decisions based on collective knowledge of these parameters. Analysis and simulation results for various message sizes and error conditions show that there is an improvement in terms of energy efficiency, optimal message length and throughput compared to the ”Reliable data deliveries using packet optimization in multi-hop underwater sensor networks”(RDPSN).
Survey on data aggregation based security attacks in wireless sensor network Nikhath Tabassum; Geetha D. Devanagavi; Rajashekhar C. Biradar; Chaya Ravindra
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3131-3139

Abstract

Wireless sensor network (WSN) has applications in military, health care, environmental monitoring, infrastructure, industrial and commercial applications. The WSN is expected to maintain data integrity in all its network operations. However, due to the nature of wireless connectivity, WSN is prone to various attacks that alter or steal the data exchanged between the nodes. These attacks can disrupt the network processes and also the accuracy of its results. In this survey paper, we have reviewed various attacks available in the literature till date. We have also listed existing methods that focus on data aggregation based security mechanisms in WSN to counter the attacks. We have classified and compared these methods owing to their encryption techniques. This paper intends to support researchers to understand the basic attacks prevalent in WSN and schemes to counter such attacks.