Efficient Resource Utilization to Improve Quality of Service (QoS) Using Path Tracing Algorithm in Wireless Sensor Network

  • N. TamilarasiEmail author
  • S. G. Santhi
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


Wireless Sensor Network consists of a group of independent wireless devices, which is capable of exchanging information with one another without having the knowledge of predefined infrastructure or any centralized node. It functions of WSN depends on the participation of all the nodes in the network. The more nodes involved in the network traffic, the more powerful a WSN acquires. The Quality of Service (QoS) of a routing protocol is constructed successfully only if it knows the bandwidth of a coding host. Nevertheless, it is a challenging issue to identify the coding host and its bandwidth consumption in a WSN. Sending packets from one device to another is done via a chain of intermediate nodes. Detecting routes and forwarding packets consumes local CPU time, memory, network-bandwidth, and energy. We find that the existing, Authenticated Routing for Ad Hoc Network (ARAN) uses Dynamic Source Routing (DSR) Protocol, which has greater performance cost. So we propose a novelty path tracing algorithm using Ad hoc On Demand Distance Vector (AODV) routing protocol for finding the packet droppers in the WSN. The proposed Path Tracing Algorithm (PTA) also detects the Wormhole attack using per hop distance and link frequent appearance count parameters. The performance cost of the proposed method is minimal and outweighed when the security increases. As a result, there is a possibility for a node to delay the packet forwarding and at the same time it utilizes their own resources for data transmission. In the course of broad experimentation we demonstrate that the proposed method detects the Wormhole attacks and reduces the overhead required if the network size increases. Hence it is proved that the QoS is improved when compared to the existing ARAN protocol. The above proposed work is implemented using Network Simulator2 (NS2).


ARAN WSN PTA QoS Wormhole attack AODV 


  1. 1.
    Chiang, W., Zilic, Z., Radecka, K., Chenard, J.-S.: Architectures of WSN wireless sensor network nodes. In: ITC International Test Conference, vol. 43, no. 2, pp. 1232–1241 (2004)Google Scholar
  2. 2.
    Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008). Scholar
  3. 3.
    Tomur, E., Erten, Y.M.: Security and service quality analysis for cluster-based wireless sensor networks. In: Fifth International Conference on Wired/Wireless Internet Communications (WWIC 2007), Coimbra, Portugal, May 2007Google Scholar
  4. 4.
    Sachan, V.K., Imam, S.A., Beg, M.T.: Energy-efficient communication methods in wireless sensor networks: a critical review. Int. J. Comput. Appl. 39(17), 3548 (2012)Google Scholar
  5. 5.
    Rajesh, T., Kumari, V.S.R.: Design and analysis of an improved AODV routing protocol for wireless sensor networks and OPNET. Int. J. Adv. Res. Electron. Commun. Eng. 3(10), 1267–1278 (2014)Google Scholar
  6. 6.
    Sivakumar, N., Gunasekaran, G.: The quality of service support for wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(1), 297–302 (2013)Google Scholar
  7. 7.
    Mbowe, J.E., Oreku, G.S.: Quality of service in wireless sensor networks. Wirel. Sensor Netw. 6, 19–26 (2014). Scholar
  8. 8.
    Parikh, S., Patel, A., Rizvi, S.: Increasing Quality of Service (QoS) in Wireless Sensor Networks (WSN) by using timestamp optimization scheme. In: ASEE 2014 Zone I Conference, 3–5 April 2014, University of Bridgeport, Bridgpeort, CT, USA (2014)Google Scholar
  9. 9.
    Karare, A.R., Sonekar, S.V., Akanksha, K.: Improving the quality of services in wireless sensor network by improving the security. Int. J. Eng. Res. Appl. (IJERA). ISSN 2248-9622 International Conference on Industrial Automation and Computing, ICIAC, 12th & 13th April 2014Google Scholar
  10. 10.
    Elakkiya, A., Santhana, B., Ramaswamy, M.: Performance evaluation of QoS based improved rumour routing scheme for WSN. Int. J. Wirel. Commun. Netw. Technol.
  11. 11.
    Xiao, H., Seah, W.K.G., Lo, A., Chua, K.C.: A flexible quality of service model for mobile ad-hoc networks. In: Proceedings of IEEE 51st Vehicular Technology Conference, Tokyo, Japan, May 2000Google Scholar
  12. 12.
    Iyer, R., Kleinrock, L.: QoS control for sensor networks. In: ICC 2003, 11–15 May 2003, vol. 1, pp. 517–521 (2003)Google Scholar
  13. 13.
    Sanli, H.O., Çam, H., Cheng, X.: EQoS: an energy efficient QoS protocol for wireless sensor networks. In: Proceedings of the 2004 Western Simulation Multi Conference (WMC 2004), San Diego, CA, USA, 18–21 January 2004Google Scholar
  14. 14.
    Sharifi, M., Taleghan, M.A., Taherkordi, A.: A middleware layer for QoS support in wireless sensor networks. In: Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, Mauritius (2006)Google Scholar
  15. 15.
    Lee, S.-K., Koh, J.-G., Jung, C.-R.: An energy-efficient QoS aware routing algorithm for wireless multimedia sensor networks. Int. J. Multimedia Ubiquitous Eng. 9(2), 245–252 (2014)CrossRefGoogle Scholar
  16. 16.
    Perillo, M., Heinzelman, W.: Providing application QoS through intelligent sensor management. In: 1st sensor network protocols and applications workshop (SNPA 2003), Anchorage, 11 May 2003, pp. 93–101 (2003)Google Scholar
  17. 17.
    Wang, J., Xu, J., Xiang, M.: EAQR: an energy-efficient aco based QoS routing algorithm in wireless sensor networks. Chin. J. Electron. 18(1), 113–116 (2009)Google Scholar
  18. 18.
    Prabha, R., Shivaraj Karki, M.S.H., Venugopal, K.R., Patnaik, L.M.: Quality of service for differentiated traffic using multipath in wireless sensor networks. Int. J. Inven. Eng. Sci. 3(1), 61–66 (2014)Google Scholar
  19. 19.
    Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect wormhole and selective forwarding attack in WSN based on local information. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp. 824–828. IEEE (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, FEATAnnamalai UniversityAnnamalainagarIndia
  2. 2.Department of Computer and Information Science, Faculty of ScienceAnnamalai UniversityAnnamalainagarIndia

Personalised recommendations