scispace - formally typeset
Search or ask a question
Author

Sandeep Waraich

Bio: Sandeep Waraich is an academic researcher. The author has contributed to research in topics: Wireless sensor network & Node (networking). The author has an hindex of 4, co-authored 8 publications receiving 71 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper reviews the taxonomy of WSN routing protocols and also highlights issues in LEACH protocol along with disadvantages, and compares some features of LEach protocol variants.
Abstract: Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. LEACH is the conventional hierarchical clustering protocol widely used in WSNs. This paper reviews the taxonomy of WSN routing protocols and also highlights issues in LEACH protocol along with disadvantages. The objective of this paper is to provide brief detail of some LEACH improved versions. Finally this paper compares some features of LEACH protocol variants. General Terms Comparison among various descendants of LEACH protocol

53 citations

Journal ArticleDOI
TL;DR: The overall objective is to judge the various limitations of the sooner techniques and end up with the suitable future directions to boost the existing protocol further.
Abstract: Wireless Sensor networks include large amount of low power, low priced sensor nodes generally deployed in hostile and harsh environment to sense, collect and transmit data to sink at far distance. Clustering has been widely studied to enhance the lifetime of WSN by reducing the number packet transmission. In clustering, the nodes selected as cluster head, often suffer from high overload and thus consume more energy. Re-clustering is eventually performed to talk about the resource intensive cluster head role, which requires global time synchronization. To handle this problem, some recent research has been considered in the field of the wireless sensor networks. The overall objective is to judge the various limitations of the sooner techniques. This paper ends up with the suitable future directions to boost the existing protocol further.

13 citations

Journal ArticleDOI
TL;DR: Comparison of various routing protocols on the basis of various parameters like localization information, network topology, and use of control packets, network architecture used is presented.
Abstract: underwater wireless sensor networks have found many applications in today's world as they are used in medical applications, sea exploration, military applications and many more. With the advancement in the underwater wireless sensor networks technology, new research challenges are found that are to be resolved like how efficient routing can be done without sacrificing energy consumption of the sensor nodes, how the deployment of the sensor nodes should be done and so on. Due to the movement of sensor nodes with the water currents, the deployment and routing becomes a difficult task. In this paper, various routing protocols like Information Carrying routing protocol, Depth Based routing protocol, Constraint Based Depth based routing protocol, Directional flooding routing protocol are discussed and a comparative analysis of these routing protocols on the basis of various parameters like localization information, network topology, and use of control packets, network architecture used is presented.

6 citations

Journal ArticleDOI
TL;DR: Various techniques are used to optimize energy level of sensor nodes of WSN and these techniques are helpful in improving energy efficiency of wireless sensor nodes.
Abstract: In WSNs, Energy is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. These are battery powered sensor nodes. These small batteries have limited power and also may not easily rechargeable or removable. Long communication distance between sensors and a sink can greatly drain the energy of sensors and reduce the lifetime of a network. In WSNs, energy is a big factor to be considered. Various techniques are used to optimize energy level of sensor nodes of WSN. We will make a review of some of these wireless sensor network techniques which are used recently and are helpful in improving energy efficiency of wireless sensor nodes.

4 citations

Journal ArticleDOI
TL;DR: A hybrid protocol based on two extensions of LEACH protocol named TB-LEACH and CTPEDCA protocol has been proposed that considers two additional factors residual energy of sensor nodes and distance of cluster head nodes from the base station.
Abstract: sensor network is defined as the network composed of tiny and energy restricted sensor nodes Sensor nodes collect the useful information from surrounding environment and deliver it to the base station Sensor nodes have limited energy Routing protocols must consume minimum energy in order to prolong the network lifetime Clustering is most energy efficient technique LEACH is one of the fundamental clustering based protocols Many researchers had proposed changes in the LEACH protocol to overcome the drawbacks of LEACH protocol In this paper, a hybrid protocol based on two extensions of LEACH protocol named TB-LEACH and CTPEDCA protocol has been proposed This hybrid protocol also considers two additional factors residual energy of sensor nodes and distance of cluster head nodes from the base station The performance of LEACH, TB-LEACH, CTPEDCA and proposed protocol is compared on the basis of parameters FND (First node die time), HND (Half Node die time), LND (Last Node die time) and remaining energy per round

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A survey on clustering over the last two decades reveals that QoS aware clustering demands more attention and indicates that clustering techniques enhanced with smart network selection solutions could highly benefit the QoS and QoE in IoT.
Abstract: Wireless sensor network (WSN) systems are typically composed of thousands of sensors that are powered by limited energy resources. To extend the networks longevity, clustering techniques have been introduced to enhance energy efficiency. This paper presents a survey on clustering over the last two decades. Existing protocols are analyzed from a quality of service (QoS) perspective including three common objectives, those of energy efficiency, reliable communication and latency awareness. This review reveals that QoS aware clustering demands more attention. Furthermore, there is a need to clarify how to improve quality of user experience (QoE) through clustering. Understanding the users’ requirements is critical in intelligent systems for the purpose of enabling the ability of supporting diverse scenarios. User awareness or user oriented design is one remaining challenging problem in clustering. In additional, this paper discusses the potential challenges of implementing clustering schemes to Internet of Things (IoT) systems in 5G networks. We indicate that clustering techniques enhanced with smart network selection solutions could highly benefit the QoS and QoE in IoT. As the current studies for WSNs are conducted either in homogeneous or low level heterogeneous networks, they are not ideal or even not able to function in highly dynamic IoT systems with a large range of user scenarios. Moreover, when 5G is finally realized, the problem will become more complex than that in traditional simplified WSNs. Several challenges related to applying clustering techniques to IoT in 5G environment are presented and discussed.

248 citations

Journal ArticleDOI
TL;DR: A specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks and Artificial Neural Network (ANN) has been trained on the dataset to detect and classified different DoS attacks.
Abstract: Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.

162 citations

Journal ArticleDOI
TL;DR: The results clarify the ability of LEACH in enhancing the network lifetime as well as in reducing and minimizing the consumption of power.
Abstract: WSNs that stand for wireless sensor networks and include many low-cost and low power-sensing tools, local processing, and the capacity of wireless communication face some problems in two aspects: the lifetime of the network and its energy. Therefore, the aim of this paper is to overcome these limitations through enhancing the LEACH (low energy adaptive clustering hierarchy) protocol, the protocol of cluster routing, in which, LEACH is extended by identifying a cluster head according to the lowest degree of distance from the base station in order to decrease power consumption in cluster head nodes and in the whole network. Hence, the results clarify the ability of LEACH in enhancing the network lifetime as well as in reducing and minimizing the consumption of power.

90 citations

Journal ArticleDOI
TL;DR: An Intrusion Detection System (IDS) mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for its routing operation is proposed and proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption.
Abstract: In wireless sensor network (WSN), the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS) mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR) by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

28 citations