WGCHE - Weighted Grading Cluster Head Election in Wireless Sensor Networks (Record no. 8855)

MARC details
000 -LEADER
fixed length control field 07385nam a22002537a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210119b2015 a|||f mb|| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
041 0# - Language Code
Language code of text eng
Language code of abstract eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Sara Osama Ismail Elrefaey
245 1# - TITLE STATEMENT
Title WGCHE - Weighted Grading Cluster Head Election in Wireless Sensor Networks
Statement of responsibility, etc. Sara Osama Ismail Elrefaey
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2015
300 ## - PHYSICAL DESCRIPTION
Extent 89 p.
Other physical details ill.
Dimensions 21 cm.
500 ## - GENERAL NOTE
Materials specified Supervisor: Nashwa Abd El-Baki
502 ## - Dissertation Note
Dissertation type Thesis (M.A.)—Nile University, Egypt, 2015 .
504 ## - Bibliography
Bibliography "Includes bibliographical references"
505 0# - Contents
Formatted contents note Contents:<br/>1 Introduction 1<br/>1.1 Thesis Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.2 Thesis direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.3 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br/>1.4 Thesis Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br/>2 WSN Background 3<br/>2.1 Wireless Sensor Networks Applications . . . . . . . . . . . . . . . . . . . . 4<br/>2.2 Characteristics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br/>2.3 WSN Risks & Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br/>2.4 WSN structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br/>2.4.1 Flat based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br/>2.4.2 Hierarchical based routing . . . . . . . . . . . . . . . . . . . . . . . 10<br/>2.4.3 Location based routing . . . . . . . . . . . . . . . . . . . . . . . . . 10<br/>2.5 Energy Conservation using Routing Protocols . . . . . . . . . . . . . . . . 13<br/>2.5.1 Clustering phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br/>3 Cluster Head Selection Techniques 16<br/>3.1 CH selection techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>3.1.1 Power Based Selection . . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>3.1.1.1 The LEACH updates . . . . . . . . . . . . . . . . . . . . 17<br/>3.1.1.2 Improvement to lifetime . . . . . . . . . . . . . . . . . . . 19<br/>3.1.2 Location based Selection . . .<br/>3.1.2.1 Improvement to lifetime . . . . . . . . . . . . . . . . . . . 21<br/>3.1.2.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br/>3.1.3 Security aware selection . . . . . . . . . . . . . . . . . . . . . . . . 23<br/>3.1.4 Number of Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . 26<br/>3.2 Comparison between Selection Algorithms . . . . . . . . . . . . . . . . . . 26<br/>4 Weighted Grading Scheme 30<br/>4.1 Proposed scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br/>4.2 Sensor node components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.1 Operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2 Hardware Components . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2.1 Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2.2 Transceiver . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br/>4.2.2.3 External memory . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.2.2.4 Power source . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.2.2.5 Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.3 Network Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.3.1 Clustering Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>4.3.2 Routing mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br/>4.3.3 Electing rst CH . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br/>4.3.4 Networks Half-life . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br/>4.3.5 Security Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br/>4.3.5.1 Security Requirements . . . . . . . . . . . . . . . . . . . . 39<br/>4.3.5.2 Encryption technique . . . . . . . . . . . . . . . . . . . . 40<br/>4.3.5.3 Disguise the CH identity . . . . . . . . . . . . . . . . . . 40<br/>4.3.6 Handling dying node . . . . . . . . . . . . . . . . . . . . . . . . . . 40<br/>4.3.7 Sleep-awake modes . . . . . . . . . . . . . . . . . . . . . . . . . . . 41<br/>5 Election Technique Validation 43<br/>5.1 QoS Metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br/>5.1.0.1 System Evaluation Metrics . . . . . . . . . . . . . . . . . 43<br/>5.1.0.2 Lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br/>5.1.0.3 Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>5.1.0.4 Response Time . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>5.1.0.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>5.2 Individual node evaluation metrics . . . . . . . . . . . . . . . . . . . . . . 45<br/>5.3 Simulation tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46<br/>5.4 Our basic assumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br/>5.4.1 Why did we assume? . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br/>6 Simulation Results & Analysis 50<br/>6.1 Examining parameters individually . . . . . . . . . . . . . . . . . . . . . . 50<br/>6.2 Results of Combined Equation . . . . . . . . . . . . . . . . . . . . . . . . 54<br/>6.2.1 Comparison with LEACH . . . . . . . . . . . . . . . . . . . . . . . 54<br/>6.2.2 Comparison with LTILA . . . . . . . . . . . . . . . . . . . . . . . . 55<br/>6.2.3 Security Improvements . . . . . . . . . . . . . . . . . . . . . . . . . 56<br/>6.3 QoS Comparison . . . . . .<br/>6.4 Improving parameters eect . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>6.4.1 Setting thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>7 Conclusions & Future Work 62<br/>7.1 Research Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62<br/>7.2 Future Work . . . . .
520 3# - Abstract
Abstract Abstract:<br/>Wireless Sensor Networks (WSNs) consist of a collection of cheap, easy to deploy Sensor<br/>nodes arranged together to fulll a specic purpose (monitoring, tracking etc. A WSN<br/>network is composed of a Base Station (BS) and collection of sensors. There are a lot of<br/>approaches for the network construction. Amongst them is the hierarchical structure,<br/>where the network is divided into clusters and the node inside this cluster communicates<br/>with BS through a chosen leader called Cluster Head (CH). In this paper, we present<br/>cluster-Head election algorithms for WSNs. We will discuss the operations of these<br/>algorithms, and compare their performance. As well as proposing a new CH election<br/>Scheme that takes into account the transmission power as well as the network security.<br/>Choosing the right cluster head with the best security odds has the eect of increasing<br/>the network lifetime signicantly as well as improving the network throughput, and<br/>reducing the level of corrupt data and other threats that faces a network under attack.<br/>Our scheme has multiple parameters to evaluate a node. The scheme is evaluated against<br/>LEACH algorithm and The Lifetime Improvement of LEACH algorithm and it showed<br/>better results in both increasing the networks lifetime and decreasing the number of<br/>malicious nodes elected as CH's. . . .
546 ## - Language Note
Language Note Text in English, abstracts in English and Arabic
650 #4 - Subject
Subject Information Security
655 #7 - Index Term-Genre/Form
Source of term NULIB
focus term Dissertation, Academic
690 ## - Subject
School Information Security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
650 #4 - Subject
-- 294
655 #7 - Index Term-Genre/Form
-- 187
690 ## - Subject
-- 294
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Main library Main library 01/19/2021   658/ S.E.W 2015 01/19/2021 01/19/2021 Thesis