Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Data Gathering and Route Optimization Protocol for Mobile Sink in Wireless Sensor Networks

Author : B.Bhuvaneshwari 1 Dr.G.Anna Poorani 2 V.M.Priyadharshini 3

Date of Publication :21st June 2017

Abstract: Wireless sensor networks are the grouping of tiny sensor node collects the information by sensing activeness from the surroundings. The way the sinks are not move freely in the deployed space. The pre-calculated trajectories may not applicable. To avoid this constant sink location updating, by using mobile sinks rather than static for data collection is the proposed system. This project is focusing on moving patterns of the mobile sink to achieve optimized network performance, and also collecting a small area of sensed data in the network.

Reference :

    1. Barrie Sosinsky, ―Cloud Computing Bible,‖ Published by John Wiley & Sons, 2011, J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
    2. Ronald L. Krutz and Russel Dean Vines, ―Cloud Security: A Comprehensive Guide to Secure Cloud Computing,‖ Published by John Wiley & Sons, 2010
    3. Chi Zhang, Jinyuan Sun, Xiaoyan Zhu and Yuguang Fang, "Privacy and security for online social networks: challenges and opportunities" Published in IEEE Network Volume 24, Issue 4 in 2010, Pg 13-18
    4. Cutillo, L.A., Molva, R. and Strufe, T, "Privacy preserving social networking through decentralization", published in Wireless On- Demand Network Systems and Services, 2009. WONS 2009, IEEE, Pg 145-152
    5. Catherine Dwyer, Starr Roxanne Hiltz and Katia Passerini, "Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace", Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado August 09 – 12 2007
    6. Elena Zheleva, Evimaria Terzi and Lise Getoor, "Privacy in Social Networks", Published by Morgan & Claypool Publishers in 2013
    7. G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders, "Social networks and context-aware spam.‖ In ACM Conference on Computer Supported Collaborative Work, 2008.
    8. Hope Villiard and Megan A. Moreno, "Fitness on Facebook: Advertisements Generated in Response to Profile Content", Published in Cyberpsychol Behav Soc Netw. Oct 2012; 15(10): 564–568.
    9. Nour Mohammed Almadhoun, P. dhanapal Darai Dominic and Lai Fong Woon, "Perceived Security, Privacy and Trust concerns within Social Networking Sites" ,Published in IEEE International Conference on Control System,, Computing and Engineering in 2011
    10. Anil Dhami, Neha Agarwal, Tamal Chakraborthy, Brijendra Pratap Singh and Jasmine Minj, "Impact of trust, security and privacy concerns in social networking: An exploratory study to understand the pattern of information revelation in Facebook", Published in 3rd IEEE International Advance Computing Conference, 2013.
    11. Esma Aimeur, Sebastian Grams and Ai Ho, ―Towards a Privacy- enhanced Social Networking Site‖, Published in International Conference on Availability , Reliability and Security, 2010.
    12. Varun M Deshpande, Dr. Mydhili K. Nair, Balaji Soundararajan(2013), Customer Driven SLA in Cloud Based Systems, In Proceedings published by Elsevier of International Conference of Emerging Computations and Information Technologies, SIT, Tumkur, Karnataka (India), 22-23 November, 2013, pp 508-518
    13. Varun M Deshpande, Dr. Mydhili K. Nair (2014), Anveshana – Search for the Right Service, In Proceedings published by IEEE of International Conference of Convergence of Technology, Pune, Maharastra (India), ISBN 978-1-4799-3759-2
    14. Mark Rhodes-Ousley, "Information Security The Complete Reference, Second Edition", Published by Tata McGraw-Hill, 2013
    15. Online Survey on Digital Privacy, Resultshttps://docs.google.com/spreadsheets/d/1WqD5_Ao mCdnTlNS_SmEkX yXbNJ6QnepcsaPuOJAzTY/edit#gid=1319521219
    16. http://ec.europa.eu/justice/dataprotection/individuals/ind ex_en.htm(Last Accessed on Feb 18, 2016)
    17. http://www.it.ojp.gov/PrivacyLiberty/authorities/statute s/1287 (Last Accessed on Feb 18, 2016)
    18. Varun M Deshpande, Dr. Mydhili K. Nair (2017), ―A Novel Framework for Privacy Preserving AdFree Social Networking‖, published in Proceedings by IEEE of 2017 2nd International Conference for Convergence in Technology (I2CT), Pune, Maharastra (India), ISBN 978-1- 5090-4307-1/17
    19. Michel Schreiner, Thomas Hess,2015 "WHY ARE CONSUMERS WILLING TO PAY FOR PRIVACY?AN APPLICATION OF THE PRIVACY-FREEMIUM MODEL TO MEDIA COMPANIES" published in Twenty-Third European Conference on Information Systems (ECIS), Münster, Germany, 2015

    1. S. Basagni, A. Carosi, E. Melachrinoudis, C. Petrioli, and Z.M.Wang. Controlled sink mobility for Prolonging Wireless sensor networks lifetime. ACM/Elsevier Wireless Networks, 2007.
    2. E. Lee, S. Park, F. Yu, S. Kim, Communication model and protocol based on multiple static sinks for supporting mobile users in wireless sensor networks, IEEE Transactions on Consumer Electronics 56 (2010) 1652–1660.
    3. E. Lee, S. Park, J. Lee, S. Oh, S. Kim, Novel service protocol for supporting remote and mobile users in wireless sensor networks with multiple static sinks, Wireless Networks 17 (2011) 861–875.
    4. Z. Vincze, R. Vida, A. Vidács, Deploying multiple sinks in multi-hop wireless sensor networks, in: Proceedings of ICPS IEEE International Conference on Pervasive Services, Istanbul, Turkey, 2007, pp. 55–63.
    5. C. Avin, B. Krishnamachari, The power of choice in random walks: an empirical study, in: Proceedings of the 9th ACM international symposium on Modelling analysis and simulation of wireless and mobile systems (MSWiM „06), New York, NY, USA, October 2006, pp. 219–228.
    6. M.J. Handy, M. Haase, D. Timmermann, Low energy adaptive clustering hierarchy with deterministic cluster-head selection, in: Proceeding of 4th International Workshop on Mobile and Wireless Communications, Network, 2002, pp. 368–372.
    7. S.V. Manisekaran, R. Venkatesan, Energy efficient hierarchical clustering for sensor networks, in: Proceedings of international conference on computing communication and networking technologies, 2010, pp. 1–11.
    8. P.T.A. Quang, N.Q. Dinh, J. Yun, D. Kim, Optimal clustering for wireless sensor networks using intermediate nodes, in: Proceedings of IEEE 3rd InternationalConference on Communication Software and Networks (ICCSN), 2011, pp.138–142
    9. A.R. Masoum, A.H. Jahangir, Z. Taghikhani, R. Azarderakhsh, A new multi level clustering model to increase lifetime in wireless sensor networks, in: Proceedings of the second International Conference on Sensor Technologies and Applications, 2008, pp. 185–190.
    10. J.N. Al-Karaki, R. Ul-Mustafa, A.E. Kamal, Data aggregation in wireless sensor networks – exact and approximate algorithms, in: Proceedings of IEEE Workshop on High Performance Switching and Routing (HPSR), Phoenix,Arizona, USA, 2004, pp. 241–245.
    11. I. Chatzigiannakis, A. Kinalis, S. Nikoletseas, Sink mobility protocols for data collection in wireless sensor networks, in: Proceedings of the international Workshop on Mobility Management and Wireless Access, MobiWac „06, Terromolinos, Spain, 2006, pp. 52–59.
    12. Y. Wu, L. Zhang, Y. Wu, Z. Niu, Interest dissemination with directional antennas for wireless sensor networks with mobile sinks, in: Proceedings of the 4th international Conference on Embedded Networked Sensor Systems, SenSys „06, Boulder, Colorado, USA, 2006, pp. 99–111.
    13. A. Giannakos, G. Karagiorgos, I. Stavrakakis, message optimal sink mobility model for wireless sensor networks, in: Proceeding of 8th International Conference on, Networks, 2009, pp. 287–291.

Recent Article