An ant based compromising path approach to avoid selfish node attack in mobile networks

In first stage, the communication is performed through the effective shortest path. The second stage, the identification of block node or the attack node over the network is performed and in third stage, the network reconfiguration is performed as the bad nodes are detected. This paper attempts to optimize the reconfiguration process using ant optimization approach. | ISSN:2249-5789 Monika et al , International Journal of Computer Science & Communication Networks,Vol 2(4), 516-519 An Ant Based Compromising Path Approach to Avoid Selfish Node Attack in Mobile Networks Monika1 and Nasib Singh Gill2 Department of Computer Science & Applications, M. D. University, Rohtak, Haryana E-mail : and nasibsgill@ Abstract: Each network suffers from different kinds of active and passive attacks. But in case of sensor network this problem is more critical as each node lose some energy on each communication and thus needs effective reconfiguration of network that minimize energy loss. In the present work we propose an ant based approach to perform the dynamic reconfiguration of network as some broken link or the attack node found over the network. The complete work is divided in three main stages. In first stage, the communication is performed through the effective shortest path. The second stage, the identification of block node or the attack node over the network is performed and in third stage, the network reconfiguration is performed as the bad nodes are detected. This paper attempts to optimize the reconfiguration process using ant optimization approach. The results obtained are encouraging and shows that the presented work is effective in terms of accuracy as well as efficiency. Keywords: Sensor Network, Block Node, Ant Optimization, Reconfiguration, Energy Efficient I. sensors to CHs, and routing has to be taken into account within the same global planning process. Besides achieving energy efficiency, clustering reduces channel contention and packet collisions, resulting in better network throughput under high load. Generally, energy conservation is dealt with on four different levels: 1. 2. 3. 4. Efficient scheduling of sensor states to alternate between sleep and active modes; Energy-efficient routing, clustering, and data aggregation; Efficient control of transmission power to ensure an optimal .

Bấm vào đây để xem trước nội dung
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.