Pub Date : 2015-07-25DOI: 10.15662/IJAREEIE.2015.0405034
Liji Merin, Vimlesh Kumar
Mobile nodes have limited battery energy and in MANETs it is usually impossible to replace these batteries during emergency. So, energy efficient routing in MANETs is a very critical task. In this paper a comparative performance analysis of routing protocols (DSR ,STAR and LAR) has been done on the basis of energy consumption ,packet delivery ratio, jitter and end to end delay using QualNet 5.0.2. The obtained results indicate that STAR is more energy efficient than other two protocols.
{"title":"Performance Analysis of DSR,LAR and STARof MANETs for CBR traffic","authors":"Liji Merin, Vimlesh Kumar","doi":"10.15662/IJAREEIE.2015.0405034","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405034","url":null,"abstract":"Mobile nodes have limited battery energy and in MANETs it is usually impossible to replace these batteries during emergency. So, energy efficient routing in MANETs is a very critical task. In this paper a comparative performance analysis of routing protocols (DSR ,STAR and LAR) has been done on the basis of energy consumption ,packet delivery ratio, jitter and end to end delay using QualNet 5.0.2. The obtained results indicate that STAR is more energy efficient than other two protocols.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"9 1","pages":"4032-4038"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82244073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-25DOI: 10.15662/IJAREEIE.2015.0405019
Ashish Gupta, A. Singh, Gurpreet Singh, Arun Kumar
Electricity is lifeline of any country and its continuous availability at minimum cost ensure the country’s growth. Reducing the burden over the energy resources leads to the use of alternative sources of energy like Solar, Wind etc. also they are available free of cost. So modern industries and homes, to ensure regular power supply incorporates mainly three sources of energy i.e. Solar, Mains(Utility grid), Diesel generator sets. So an automatic phase selector circuit is required for the switching between these supplies with the Solar having the highest priority followed by Mains for having access of cheapest electricity. The circuit make use of Transformer, Rectifier, Regulator, Comparator and Relays. The switching time is reduced considerably due to the use of high speed electronics devices.
{"title":"Automatic Cost Effective Phase Selector","authors":"Ashish Gupta, A. Singh, Gurpreet Singh, Arun Kumar","doi":"10.15662/IJAREEIE.2015.0405019","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405019","url":null,"abstract":"Electricity is lifeline of any country and its continuous availability at minimum cost ensure the country’s growth. Reducing the burden over the energy resources leads to the use of alternative sources of energy like Solar, Wind etc. also they are available free of cost. So modern industries and homes, to ensure regular power supply incorporates mainly three sources of energy i.e. Solar, Mains(Utility grid), Diesel generator sets. So an automatic phase selector circuit is required for the switching between these supplies with the Solar having the highest priority followed by Mains for having access of cheapest electricity. The circuit make use of Transformer, Rectifier, Regulator, Comparator and Relays. The switching time is reduced considerably due to the use of high speed electronics devices.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"2015 1","pages":"3919-3925"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78353226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-25DOI: 10.15662/ijareeie.2015.0405033
Pankaj Rakheja, R. Saini, Nankita Asija, Diwakar Kamboj
Cryptography is the art of making text non readable from human readable to ensure secure communication over the network. It is classified basically into two types one is symmetric cryptography and the other is asymmetric cryptography. In the symmetric cryptography we use single key for encryption and decryption process which creates trouble of key sharing whereas in asymmetric cryptography two different keys are used for one for encryption and other for decryption which solves dependence on key sharing to large extent. But now traditional cryptographic ciphers are more prone to attacks and problem of authentication also exists as users have increased and few of them try to have unauthorized access. In order to solve this issue we have integrated biometric and visual cryptographic modules in the basic RSA module to make it more secure. The RSA encrypted text or message is hidden through LSB insertion in an image which also has shares of the fingerprint of the desired recipient. Along with that we have used the Caesar and mix columnar operation which protects RSA from man in middle attack as to decode the encoded text, attacker needs to know key used in mix columnar operation too. And as the size of text increases mix columnar becomes more effective. Moreover the receiver would be able to get the message only if his fingerprint matches to that of the desired one else he would just be able to see image only that is we have hidden the existence of secret message so as to make it even more secure. Matlab simulation has been carried out to validate the proposed technique
{"title":"Unique Cipher Mechanism for EnsuringSecure Data Flow over Network","authors":"Pankaj Rakheja, R. Saini, Nankita Asija, Diwakar Kamboj","doi":"10.15662/ijareeie.2015.0405033","DOIUrl":"https://doi.org/10.15662/ijareeie.2015.0405033","url":null,"abstract":"Cryptography is the art of making text non readable from human readable to ensure secure communication over the network. It is classified basically into two types one is symmetric cryptography and the other is asymmetric cryptography. In the symmetric cryptography we use single key for encryption and decryption process which creates trouble of key sharing whereas in asymmetric cryptography two different keys are used for one for encryption and other for decryption which solves dependence on key sharing to large extent. But now traditional cryptographic ciphers are more prone to attacks and problem of authentication also exists as users have increased and few of them try to have unauthorized access. In order to solve this issue we have integrated biometric and visual cryptographic modules in the basic RSA module to make it more secure. The RSA encrypted text or message is hidden through LSB insertion in an image which also has shares of the fingerprint of the desired recipient. Along with that we have used the Caesar and mix columnar operation which protects RSA from man in middle attack as to decode the encoded text, attacker needs to know key used in mix columnar operation too. And as the size of text increases mix columnar becomes more effective. Moreover the receiver would be able to get the message only if his fingerprint matches to that of the desired one else he would just be able to see image only that is we have hidden the existence of secret message so as to make it even more secure. Matlab simulation has been carried out to validate the proposed technique","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"28 1","pages":"4023-4031"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81445806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-25DOI: 10.15662/IJAREEIE.2015.0405014
Jayashri Joshi, Sachin Pathare, N. Pardeshi, Ubed Momin
“Power theft” is a non-ignorable crime that is highly prevalent and at the same time it directly affects the economy of the nation. Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. When importance of electricity is on the increasing side, then why theft of this energy or illegal consumption of power should be ignored. Hence this Paper “Split metering to prevent energy theft” is proposed. Electric Energy Meter (kWh) for domestic and industrial use are provided with anti-tampering features, in spite of these features, people try to steal electric energy by totally bypassing the meter and utility companies are incurring heavy losses in revenue. To stop these unethical practices – utilities have come up with the idea to install the meter in nearest electric mast of the consumer’s house and install a remote display unit in the consumer’s premises. Also the module for automatic meter reading is to be design.
{"title":"Split Metering to Prevent Energy Theft","authors":"Jayashri Joshi, Sachin Pathare, N. Pardeshi, Ubed Momin","doi":"10.15662/IJAREEIE.2015.0405014","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405014","url":null,"abstract":"“Power theft” is a non-ignorable crime that is highly prevalent and at the same time it directly affects the economy of the nation. Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. When importance of electricity is on the increasing side, then why theft of this energy or illegal consumption of power should be ignored. Hence this Paper “Split metering to prevent energy theft” is proposed. Electric Energy Meter (kWh) for domestic and industrial use are provided with anti-tampering features, in spite of these features, people try to steal electric energy by totally bypassing the meter and utility companies are incurring heavy losses in revenue. To stop these unethical practices – utilities have come up with the idea to install the meter in nearest electric mast of the consumer’s house and install a remote display unit in the consumer’s premises. Also the module for automatic meter reading is to be design.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"77 1","pages":"3887-3891"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78087996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-25DOI: 10.15662/IJAREEIE.2015.0405002
Priyanka Gaikwad, P. Jambhule, Sheetal Kekan, S.K.Gaikwad
The pattern of this paper comprises of a self-navigating robotic ship(ship spy)as a base on which guided by the computer in the control room and the remote triggered for a weapon is fitted in the ship vehicle. The PIC Controller acts as a crucial scheming element for the ritual built vehicle. The PIC architecture describes a family of RISC-based COMPUTER PROCESSOR. The reduced complexity and simpler design build a low-energy system on chip for an embedded system incorporating memory, interfaces, radios, etc. The ship contains single board embedded system that is equipped with GPS and RF modems along with PIC processor, which in turns the GPS receiver has been interfaced with the vehicle which is capable of receiving information from the GPS satellites and this technology allows the system in finding out the location of the ship in terms of Latitude and longitude coordinates, anywhere on earth and provides most up to date information about ongoing trips. The control room can transmit the targeted location by RF modem technology to the ship in terms of Latitude and longitude data. Once the ship receives this data, the microcontroller unit compares the targeted location with the present location and separately moves to the desired location. Additionally the camera is mounted on the robotic ship, which is in a scanning pattern to capture all the visible details around the ship.The video is transmitted to a control room through RF module, if the presence on enemy is detected the mounted weapon on the vehicle is triggered based on the commands from the control room. The main purpose of this project is to provide following features a)Location information b)Real time tracking c)Communication is instantaneous therefore we can receive running report d)Completely integrated controlled and monitored by control room
{"title":"Design and Implementation of Navigation andCombat Ship","authors":"Priyanka Gaikwad, P. Jambhule, Sheetal Kekan, S.K.Gaikwad","doi":"10.15662/IJAREEIE.2015.0405002","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405002","url":null,"abstract":"The pattern of this paper comprises of a self-navigating robotic ship(ship spy)as a base on which guided by the computer in the control room and the remote triggered for a weapon is fitted in the ship vehicle. The PIC Controller acts as a crucial scheming element for the ritual built vehicle. The PIC architecture describes a family of RISC-based COMPUTER PROCESSOR. The reduced complexity and simpler design build a low-energy system on chip for an embedded system incorporating memory, interfaces, radios, etc. The ship contains single board embedded system that is equipped with GPS and RF modems along with PIC processor, which in turns the GPS receiver has been interfaced with the vehicle which is capable of receiving information from the GPS satellites and this technology allows the system in finding out the location of the ship in terms of Latitude and longitude coordinates, anywhere on earth and provides most up to date information about ongoing trips. The control room can transmit the targeted location by RF modem technology to the ship in terms of Latitude and longitude data. Once the ship receives this data, the microcontroller unit compares the targeted location with the present location and separately moves to the desired location. Additionally the camera is mounted on the robotic ship, which is in a scanning pattern to capture all the visible details around the ship.The video is transmitted to a control room through RF module, if the presence on enemy is detected the mounted weapon on the vehicle is triggered based on the commands from the control room. The main purpose of this project is to provide following features a)Location information b)Real time tracking c)Communication is instantaneous therefore we can receive running report d)Completely integrated controlled and monitored by control room","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"76 5 1","pages":"3807-3812"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89229473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-25DOI: 10.15662/IJAREEIE.2015.0405009
S. Tiwari, Aditya Pandey
The main purpose of a current transformer is to translate the primary current in a high voltage power system to single level that can be handled by delicate electromechanical or electronic device. Current transformers are the very important aspect of the power system protection. So for the correct CT operation the accuracy class of CT sizing&should be Adequate with the system current & related burden and effective transient condition. In this paper, it proposes advance CT sizing concept with KTD and X/R ratio factor with CT performance analysis at different -2 CT Burden and CT saturation analysis at Asymmetrical Current condition with the Alternating Transient Programming (ATP) software.
{"title":"Current Transformer Sizing & SaturationCalculation with Transient PerformanceAnalysis of CT Using ATP Software","authors":"S. Tiwari, Aditya Pandey","doi":"10.15662/IJAREEIE.2015.0405009","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405009","url":null,"abstract":"The main purpose of a current transformer is to translate the primary current in a high voltage power system to single level that can be handled by delicate electromechanical or electronic device. Current transformers are the very important aspect of the power system protection. So for the correct CT operation the accuracy class of CT sizing&should be Adequate with the system current & related burden and effective transient condition. In this paper, it proposes advance CT sizing concept with KTD and X/R ratio factor with CT performance analysis at different -2 CT Burden and CT saturation analysis at Asymmetrical Current condition with the Alternating Transient Programming (ATP) software.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"21 1","pages":"3853-3860"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86802621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.15662/IJAREEIE.2015.0404106
K.Sangeetha, K.R.Renugadevi
Sign language recognition is a very challenging research area. In this proposed system, a well trained computer system is used to recognize static hand gestures representing linguistic words. The main aim of the paper is conversion of linguistic sign languages into text and speech form. Recognized sign are also translated into Tamil and Hindi languages. It contains three processes of work. First process is pre-processing, in which the obtained images are processed through the steps like segmentation, resize, and gray conversion. Second process is region-based analysis which exploits both boundary and interior pixels of an object. Solidity, perimeter, convex hull, area, major axis length, minor axis length, eccentricity, orientation are some of the shape descriptors used as features in this process. The features derived are used to train the binary classifier first; secondly the testing images are given for classification. Knn classifiers are used for classification which provides a good result with less computation time for larger datasets. Since, the system handled a binary classifier it performed a one-versus-all kind of classification. PCNN (Pulse Coupled Neural Network) is used for pattern recognition. Third process is the hand gesture recognition.
{"title":"Linguistic Sign Language Recognition ThoughImage Based Approach","authors":"K.Sangeetha, K.R.Renugadevi","doi":"10.15662/IJAREEIE.2015.0404106","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404106","url":null,"abstract":"Sign language recognition is a very challenging research area. In this proposed system, a well trained computer system is used to recognize static hand gestures representing linguistic words. The main aim of the paper is conversion of linguistic sign languages into text and speech form. Recognized sign are also translated into Tamil and Hindi languages. It contains three processes of work. First process is pre-processing, in which the obtained images are processed through the steps like segmentation, resize, and gray conversion. Second process is region-based analysis which exploits both boundary and interior pixels of an object. Solidity, perimeter, convex hull, area, major axis length, minor axis length, eccentricity, orientation are some of the shape descriptors used as features in this process. The features derived are used to train the binary classifier first; secondly the testing images are given for classification. Knn classifiers are used for classification which provides a good result with less computation time for larger datasets. Since, the system handled a binary classifier it performed a one-versus-all kind of classification. PCNN (Pulse Coupled Neural Network) is used for pattern recognition. Third process is the hand gesture recognition.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"8 1","pages":"2498-2504"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79488132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.15662/IJAREEIE.2015.0404105
N. Mani, A. Sebastian, A. Paul, Alex Chacko, Anupa Raghunath
This paper delivers a method to guide and control the wheelchair for disabled people based on movement of eye. This concept can be used for people with loco-motor disabilities. The proposed system involves three stages: image detection, image processing and sending of control signals wheelchair. The eye movement is detected using a head mounted camera. The images of the eye will be sent to the laptop where the images will be processed using Python software. The corresponding output signals are then send to the motor driving circuit which control the motors.
{"title":"Eye Controlled Electric Wheel Chair","authors":"N. Mani, A. Sebastian, A. Paul, Alex Chacko, Anupa Raghunath","doi":"10.15662/IJAREEIE.2015.0404105","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404105","url":null,"abstract":"This paper delivers a method to guide and control the wheelchair for disabled people based on movement of eye. This concept can be used for people with loco-motor disabilities. The proposed system involves three stages: image detection, image processing and sending of control signals wheelchair. The eye movement is detected using a head mounted camera. The images of the eye will be sent to the laptop where the images will be processed using Python software. The corresponding output signals are then send to the motor driving circuit which control the motors.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"1 1","pages":"2494-2497"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89757952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.15662/IJAREEIE.2015.0404104
eep K Waghmare, Amruta S Deshp
Step up conversion is widely used in many applications such as Electric vehicles, Photovoltaic (PV) system, Uninterruptible power supplies (UPS) and fuel cell system. This paper shows simulation of conventionaland interleaveddc-dc boost converter using NI MULTISIM software. Theseconvertersare tested by varying the input voltage with constant duty cycle in Continuous Conduction Mode (CCM). The performance parameters of both the converters are compared. Control of these converters is done by switching signals having fixed switching frequency.Using interleaved converter we can reduced ripple at output voltageand output current.
{"title":"Performance Analysis and Comparison ofConventional and Interleaved DC/DC BoostConverter Using MULTISIM","authors":"eep K Waghmare, Amruta S Deshp","doi":"10.15662/IJAREEIE.2015.0404104","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404104","url":null,"abstract":"Step up conversion is widely used in many applications such as Electric vehicles, Photovoltaic (PV) system, Uninterruptible power supplies (UPS) and fuel cell system. This paper shows simulation of conventionaland interleaveddc-dc boost converter using NI MULTISIM software. Theseconvertersare tested by varying the input voltage with constant duty cycle in Continuous Conduction Mode (CCM). The performance parameters of both the converters are compared. Control of these converters is done by switching signals having fixed switching frequency.Using interleaved converter we can reduced ripple at output voltageand output current.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"137 1","pages":"2297-2303"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75994915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-11DOI: 10.15662/IJAREEIE.2015.0404028
P.Mahalakshmi
In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.
{"title":"Comparison of LEACH protocol withWormhole Attack and without WormholeAttack in Wireless Sensor Networks","authors":"P.Mahalakshmi","doi":"10.15662/IJAREEIE.2015.0404028","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404028","url":null,"abstract":"In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"22 1","pages":"2053-2059"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80200858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}