A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs

Nomica Imran, A. I. Khan

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

Wireless Sensor Networks (WSNs) generate massive amount of live data and events sensed through dispersedly deployed tiny sensors. This generated data needed to be disseminate to the sink with slight consumption of network resources. Researchers prefer to choose gossiping to disseminate bulk data for unstructured ad-hoc wireless sensor networks. An important consideration in gossip-based dissemination protocols is to keep routing table up to date. Considering the inherent resource constrained nature of adhoc wireless sensor networks, we propose a gossip based protocol that consumes little resources. Our proposed scheme aims to keep the routing table size R as low as possible yet it ensures that the diameter is small too. We learned the performance of our proposed protocol through simulations .Results show that our proposed protocol attains major improvement in network reachability and connectivity.

Original languageEnglish
Title of host publicationAdvances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
Pages450-460
Number of pages11
Volume5576 LNCS
DOIs
Publication statusPublished - 2009
Event3rd International Conference on Information Security and Assurance, ISA 2009 - Seoul, Korea, Republic of (South)
Duration: 25 Jun 200927 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5576 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

Conference3rd International Conference on Information Security and Assurance, ISA 2009
CountryKorea, Republic of (South)
CitySeoul
Period25/06/0927/06/09

Cite this

Imran, N., & Khan, A. I. (2009). A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs. In Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings (Vol. 5576 LNCS, pp. 450-460). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5576 LNCS). https://doi.org/10.1007/978-3-642-02617-1_46