Advertisement

Advanced Spatial Reutilization for Finding Ideal Path in Wireless Sensor Networks

  • A. Basi ReddyEmail author
  • P. LiyazEmail author
  • B. Surendra ReddyEmail author
  • K. Manoj Kumar
  • K. Sathish
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1046)

Abstract

The extensions in wireless sensor networks has stated that the research communities to turn up into the study of spatial reusability concepts. Because of restricted capacity in wireless links, the keen task is to select the optimal route for packet transmission. The optimal route selection which is achieved is verifiable by using the tremendous end-to-end efficiency rate. Wireless Sensor Networks routing is ideal confront because of essential features that differentiate these kind of networks are differ from other wireless networks like cellular networks or mobile ad hoc networks. This paper proposed an enhanced spatial reusability process using single path and any path routing protocols. Task of the single path routing is to reduce the cost of the nodes in wireless links, although the work of any path routing is to aid the intermediary node, one who observes the packet to take part in packet forwarding. Empirical outputs have shown the potency of our proposed work in terms of cost reduction functionalities.

Keywords

Wireless sensor networks Wireless links Packet forwarding Cost minimization Single path and any path routing protocols 

References

  1. 1.
    Shabu, S.J., Kumar, M.: “K” preserving user’s privacy in personalized search. Int. J. Appl. Eng. Res. (IJAER) 9(22), 16269–16276 (2014)Google Scholar
  2. 2.
    Kumar, K.M., Vikram, M.: Disclosure of user’s profile in personalized search for enhanced privacy. Int. J. Appl. Eng. Res. (IJAER) 10(16), 36358–36363 (2015)Google Scholar
  3. 3.
    Kandala, H., Tripathy, B.K., Manoj Kumar, K.: A framework to collect and visualize user’s browser history for better user experience and personalized recommendations. In: Satapathy, S.C., Joshi, A. (eds.) ICTIS 2017. SIST, vol. 83, pp. 218–224. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-63673-3_26CrossRefGoogle Scholar
  4. 4.
    Yuvaraju, B.V., Venkiteela, L., Kumar, K.M.: A presumptuous encephalon electronic brain computing in gaming gadgets. In: 2018 International Conference on Soft-Computing and Network Security (ICSNS), Coimbatore, India, pp. 1–6 (2018)Google Scholar
  5. 5.
    Kumar, K.M., Kandala, H., Reddy, N.S.: Synthesizing and imitating handwriting using deep recurrent neural networks and mixture density networks. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bangalore, pp. 1–6 (2018)Google Scholar
  6. 6.
    Devi, K.J., Moulika, G.B., Sravanthi, K., Kumar, K.M.: Prediction of medicines using LVQ methodology. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, pp. 388–391 (2017)Google Scholar
  7. 7.
    Bhavana, G., Kumar, K.M.: Cardiac disease monitoring based on ZigBee technology. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, pp. 392–395 (2017)Google Scholar
  8. 8.
    Razvi, S.A., Neelima, S., Prathyusha, C., Yuvasree, G., Ganga, C., Kumar, K.M.: Implementation of graphical passwords in internet banking for enhanced security. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, pp. 35–41 (2017)Google Scholar
  9. 9.
    Kumar, K.M., Tejasree, S., Swarnalatha, S.: Effective implementation of data segregation &; extraction using big data in E - health insurance as a service. In: 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, pp. 1–5 (2016)Google Scholar
  10. 10.
    Praveen Kumar, R., Manoj Kumar, K., Tejasree, S., Aswini, R.: Review on cost effective and dynamic security provision strategy of staging data items in cloud. Res. J. Pharm. Biol. Chem. Sci. (RJPBCS) 7(6), 1592–1597 (2016). ISSN: 0975-8585Google Scholar
  11. 11.
    Rajendran, P.K., Asbern, A., Manoj Kumar, K., Rajesh, M., Abhilash, R.: Implementation and analysis of MapReduce on biomedical big data. Indian J. Sci. Technol. (IJST) 9(31), 1–6 (2016). ISSN/E-ISSN: 0974-6846/0974-5645Google Scholar
  12. 12.
    Kilaru, S., Lakshmanachari, S., Kishore, P.K., Surendra, B., Vishnuvardhan, T.: An efficient probability of detection model for wireless sensor networks. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 585–593. Springer, Singapore (2017).  https://doi.org/10.1007/978-981-10-2471-9_56CrossRefGoogle Scholar
  13. 13.
    Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.G.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of 4th Annual ACM/IEEE International Conference Mobile Computing Network, pp. 85–97 (1998)Google Scholar
  14. 14.
    Chachulski, S., Jennings, M., Katti, S., Katabi, D.: Trading structure for randomness in wireless opportunistic routing. In: Proceedings of SIGCOMM Conference Applications, Technologies, Architectures and Protocols Computer Communications, pp. 169–180 (2007)Google Scholar
  15. 15.
    Johnson, C.D.B., Maltz, D.A.: Dynamic source routing in adhoc wireless networks. Mobile Comput. vol. 353, pp. 153–181 (1992)Google Scholar
  16. 16.
    Perkins, C.E., Bhagwat, P.: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. In: Proceedings of Conference Communication Architecture, Protocols Applications, pp. 234–244 (1994)CrossRefGoogle Scholar
  17. 17.
    Laufer, R.P., Dubois-Ferriere, H., Kleinrock, L.: Multirate anypath routing in wireless mesh networks. In: Proceedings of INFOCOM, pp. 37–45 (2009)Google Scholar
  18. 18.
    Lin, Y., Li, B., Liang, B.: CodeOR: opportunistic routing in wireless mesh networks with segmented network coding. In: Proceedings of IEEE International Conference Network Protocols, pp. 13–22 (2008)Google Scholar
  19. 19.
    Kim, T.S., Hou, J.C., Lim, H.: Improving spatial reuse through tuning transmits power, carrier sense threshold, and data rate in multihop wireless networks. In: Proceedings of 12th Annual International Conference Mobile Computing Networking, pp. 366–377 (2006)Google Scholar
  20. 20.
    Draves, R., Padhye, J., Zill, B.: Routing in multi-radio, multihop wireless mesh networks. In: Proceedings of 10th Annual Internatioanl Conference on Mobile Computing and Networking, pp. 114–128 (2004)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentSV College of EngineeringTirupatiIndia
  2. 2.Computer Science and Engineering DepartmentSreenivasa Institute of Technology and Management StudiesMurukambattu, ChittoorIndia

Personalised recommendations