WGCHE - Weighted Grading Cluster Head Election in Wireless Sensor Networks (Record no. 8855)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 07385nam a22002537a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210119b2015 a|||f mb|| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| 041 0# - Language Code | |
| Language code of text | eng |
| Language code of abstract | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 658 |
| 100 0# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Sara Osama Ismail Elrefaey |
| 245 1# - TITLE STATEMENT | |
| Title | WGCHE - Weighted Grading Cluster Head Election in Wireless Sensor Networks |
| Statement of responsibility, etc. | Sara Osama Ismail Elrefaey |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2015 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 89 p. |
| Other physical details | ill. |
| Dimensions | 21 cm. |
| 500 ## - GENERAL NOTE | |
| Materials specified | Supervisor: Nashwa Abd El-Baki |
| 502 ## - Dissertation Note | |
| Dissertation type | Thesis (M.A.)—Nile University, Egypt, 2015 . |
| 504 ## - Bibliography | |
| Bibliography | "Includes bibliographical references" |
| 505 0# - Contents | |
| Formatted contents note | Contents:<br/>1 Introduction 1<br/>1.1 Thesis Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.2 Thesis direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.3 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br/>1.4 Thesis Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br/>2 WSN Background 3<br/>2.1 Wireless Sensor Networks Applications . . . . . . . . . . . . . . . . . . . . 4<br/>2.2 Characteristics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br/>2.3 WSN Risks & Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br/>2.4 WSN structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br/>2.4.1 Flat based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br/>2.4.2 Hierarchical based routing . . . . . . . . . . . . . . . . . . . . . . . 10<br/>2.4.3 Location based routing . . . . . . . . . . . . . . . . . . . . . . . . . 10<br/>2.5 Energy Conservation using Routing Protocols . . . . . . . . . . . . . . . . 13<br/>2.5.1 Clustering phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br/>3 Cluster Head Selection Techniques 16<br/>3.1 CH selection techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>3.1.1 Power Based Selection . . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>3.1.1.1 The LEACH updates . . . . . . . . . . . . . . . . . . . . 17<br/>3.1.1.2 Improvement to lifetime . . . . . . . . . . . . . . . . . . . 19<br/>3.1.2 Location based Selection . . .<br/>3.1.2.1 Improvement to lifetime . . . . . . . . . . . . . . . . . . . 21<br/>3.1.2.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br/>3.1.3 Security aware selection . . . . . . . . . . . . . . . . . . . . . . . . 23<br/>3.1.4 Number of Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . 26<br/>3.2 Comparison between Selection Algorithms . . . . . . . . . . . . . . . . . . 26<br/>4 Weighted Grading Scheme 30<br/>4.1 Proposed scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br/>4.2 Sensor node components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.1 Operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2 Hardware Components . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2.1 Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2.2 Transceiver . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2.3 External memory . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.2.2.4 Power source . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.2.2.5 Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.3 Network Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.3.1 Clustering Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.3.2 Routing mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br/>4.3.3 Electing rst CH . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br/>4.3.4 Networks Half-life . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br/>4.3.5 Security Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br/>4.3.5.1 Security Requirements . . . . . . . . . . . . . . . . . . . . 39<br/>4.3.5.2 Encryption technique . . . . . . . . . . . . . . . . . . . . 40<br/>4.3.5.3 Disguise the CH identity . . . . . . . . . . . . . . . . . . 40<br/>4.3.6 Handling dying node . . . . . . . . . . . . . . . . . . . . . . . . . . 40<br/>4.3.7 Sleep-awake modes . . . . . . . . . . . . . . . . . . . . . . . . . . . 41<br/>5 Election Technique Validation 43<br/>5.1 QoS Metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br/>5.1.0.1 System Evaluation Metrics . . . . . . . . . . . . . . . . . 43<br/>5.1.0.2 Lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br/>5.1.0.3 Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>5.1.0.4 Response Time . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>5.1.0.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>5.2 Individual node evaluation metrics . . . . . . . . . . . . . . . . . . . . . . 45<br/>5.3 Simulation tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46<br/>5.4 Our basic assumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br/>5.4.1 Why did we assume? . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br/>6 Simulation Results & Analysis 50<br/>6.1 Examining parameters individually . . . . . . . . . . . . . . . . . . . . . . 50<br/>6.2 Results of Combined Equation . . . . . . . . . . . . . . . . . . . . . . . . 54<br/>6.2.1 Comparison with LEACH . . . . . . . . . . . . . . . . . . . . . . . 54<br/>6.2.2 Comparison with LTILA . . . . . . . . . . . . . . . . . . . . . . . . 55<br/>6.2.3 Security Improvements . . . . . . . . . . . . . . . . . . . . . . . . . 56<br/>6.3 QoS Comparison . . . . . .<br/>6.4 Improving parameters eect . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>6.4.1 Setting thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>7 Conclusions & Future Work 62<br/>7.1 Research Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62<br/>7.2 Future Work . . . . . |
| 520 3# - Abstract | |
| Abstract | Abstract:<br/>Wireless Sensor Networks (WSNs) consist of a collection of cheap, easy to deploy Sensor<br/>nodes arranged together to fulll a specic purpose (monitoring, tracking etc. A WSN<br/>network is composed of a Base Station (BS) and collection of sensors. There are a lot of<br/>approaches for the network construction. Amongst them is the hierarchical structure,<br/>where the network is divided into clusters and the node inside this cluster communicates<br/>with BS through a chosen leader called Cluster Head (CH). In this paper, we present<br/>cluster-Head election algorithms for WSNs. We will discuss the operations of these<br/>algorithms, and compare their performance. As well as proposing a new CH election<br/>Scheme that takes into account the transmission power as well as the network security.<br/>Choosing the right cluster head with the best security odds has the eect of increasing<br/>the network lifetime signicantly as well as improving the network throughput, and<br/>reducing the level of corrupt data and other threats that faces a network under attack.<br/>Our scheme has multiple parameters to evaluate a node. The scheme is evaluated against<br/>LEACH algorithm and The Lifetime Improvement of LEACH algorithm and it showed<br/>better results in both increasing the networks lifetime and decreasing the number of<br/>malicious nodes elected as CH's. . . . |
| 546 ## - Language Note | |
| Language Note | Text in English, abstracts in English and Arabic |
| 650 #4 - Subject | |
| Subject | Information Security |
| 655 #7 - Index Term-Genre/Form | |
| Source of term | NULIB |
| focus term | Dissertation, Academic |
| 690 ## - Subject | |
| School | Information Security |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Thesis |
| 650 #4 - Subject | |
| -- | 294 |
| 655 #7 - Index Term-Genre/Form | |
| -- | 187 |
| 690 ## - Subject | |
| -- | 294 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Not For Loan | Main library | Main library | 01/19/2021 | 658/ S.E.W 2015 | 01/19/2021 | 01/19/2021 | Thesis |