Open Access Open Access  Restricted Access Subscription Access

Effective Communication in Infrastructure less Wireless Network using PQ Scheduling Algorithm

K. Thamizhmaran

Abstract


The use of wireless sensor networks (WSNs) in applications that are crucial to security is growing. They are vulnerable to a variety of security attacks due to their innate resource constraints, and one particular kind of attack that has a significant negative impact on data collecting is the grey-hole attack. Active Trust (AT), a security and trust routing mechanism based on active detection, is suggested for WSNs as a solution to that problem. The main novelty of Active Trust is that it improves the data route security in priority queuing in scheduling algorithm utilizing NS2 Simulator by actively creating multiple detection routes to swiftly discover and get nodal trust, hence avoiding black holes. To achieve Quality of Service (QoS), the performance of the priority queuing algorithm is assessed in this work.

Full Text:

PDF

References


C.-S. Chang and D.-S. Lee, Principles Architectures and Mathematical Theory of High Performance Packet Switches, National Tsing Hua University Press, 2008.

H.-C. Chiu, C.-S. Chang, J. Cheng and D.-S. Lee, " Using a single switch with $O(M)$ inputs/outputs for the construction of an optical priority queue with $O(M^{3})$ buffer ", Proc. IEEE International Conference on Computer Communications, May 2007.

R. Geldenhuys, Z. Wang, N. Chi, I. Tafur Monroy, A. M. J. Koonen, H. J. S. Dorren, et al., "Multiple recirculations through Crosspoint switch fabric for recirculating optical buffering", Electron. Lett., vol. 41, pp. 1136-1137, Sep. 2005.

R. Geldenhuys, Z. Wang, N. Chi, I. Tafur Monroy, A. M. J. Koonen, H. J. S. Dorren, et al., "Multiple recirculations through Crosspoint switch fabric for recirculating optical buffering", Electron. Lett., vol. 41, pp. 1136-1137, Sep. 2005.

J. Cheng, X.-C. Huang, C.-H. Cheng, H.-H. Chou, C.-S. Change and D.-S. Lee, Average number of recirculations in SDL constructions of optical priority queues, April 2011.

T. Takine, B. Sengupta, and T. Hasegawa, "An analysis of a discrete-time queue for broadband ISDN with priorities among traffic classes," IEEE Transactions on Communications 42(2-4): pp. 1837-1845, 1994.

Leonard Kleinrock, Queueing Systems, Volume II: Computer Applications, John Wiley, New York, 1976.

P. J. Kuehn, "Approximate analysis of general queueing networks by decomposition," IEEE Transactions on Communications, 27: pp. 113-126, 1979.

Y. Jiang, C-K. Tham, and C-C. Ko, "An approximation for waiting time tail probabilities in multiclass systems," IEEE Communications Letters, Vol. 5, No. 4, pp. 175-177, Apr. 2001. (Pubitemid 32372215)

K.Thamizhmaran., M. Anitha and Alamelunachippan (2017) “Performance Analysis of Energy-Efficient Enhanced Adaptive 3-Acknowledgement (EE-EA3ACK) Using ECC in MANET” ARPN Journal of Engineering and Applied Sciences, Vol. 12, No. 9, pp. 2901-2912.


Refbacks

  • There are currently no refbacks.