Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2020

23.08.2019

Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks

verfasst von: K. Sumathi, P. Pandiaraja

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Normally sensor nodes are located at unattended environment which has low battery power. The wireless hypermedia sensor based networks have huge capacity and continuous flow of data from source to sink. Congestion arises at the time of incoming data is greater than available resources. The congestion causes packet loss, buffer over flow, energy wastage and increases end to end delay. The proposed method Dynamic Alternate Buffer switching and Congestion Control is used to manage congestion in an efficient manner. In which congestion is detected based on remaining buffer, remaining energy and trust level of the sensor nodes. This approach is based on cost evaluation method which decides primary and spare buffers at run time. This method is used to enable dynamic buffer switching and optimize the effect of congestion. The performance of BETCC compared with various existing protocol like TCEER and TFCC in terms of energy consumption and data loss ratio.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks . IEEE Communications Magazine 40(8):102–114 Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks . IEEE Communications Magazine 40(8):102–114
2.
Zurück zum Zitat R Jiang, H Zhou, H Wang, SS Ge (2019) Maximum entropy searching. CAAI Transactions on Intelligence Technology 4(1):1–8 R Jiang, H Zhou, H Wang, SS Ge (2019) Maximum entropy searching. CAAI Transactions on Intelligence Technology 4(1):1–8
3.
Zurück zum Zitat Tang Z, Gong M (2019) Adaptive multifactorial particle swarm optimisation. CAAI Transactions on Intelligence Technology 4(1):37–46 Tang Z, Gong M (2019) Adaptive multifactorial particle swarm optimisation. CAAI Transactions on Intelligence Technology 4(1):37–46
4.
Zurück zum Zitat Lalwani S, Sharma H, Verma A, Kumar R (2019) Efficient discrete firefly algorithm for Ctrie based caching of multiple sequence alignment on optimally scheduled parallel machines. CAAI Transactions on Intelligence Technology 4(2):92–100 Lalwani S, Sharma H, Verma A, Kumar R (2019) Efficient discrete firefly algorithm for Ctrie based caching of multiple sequence alignment on optimally scheduled parallel machines. CAAI Transactions on Intelligence Technology 4(2):92–100
5.
Zurück zum Zitat Wan C-Y, Eisenman SB, Campbell AT (2003) CODA: congestion detection and avoidance in sensor networks. SenSys '03 Proceedings of the 1st international conference on Embedded networked sensor systems 266–279 Wan C-Y, Eisenman SB, Campbell AT (2003) CODA: congestion detection and avoidance in sensor networks. SenSys '03 Proceedings of the 1st international conference on Embedded networked sensor systems 266–279
6.
Zurück zum Zitat Chakraborty A et al (2013) A trust based fuzzy algorithm for congestion control in wireless multimedia sensor networks (TFCC). In: Presented in the proceedings of the IEEE international conference on informatics, Electronics & Vision, Dhaka, Bangladesh Chakraborty A et al (2013) A trust based fuzzy algorithm for congestion control in wireless multimedia sensor networks (TFCC). In: Presented in the proceedings of the IEEE international conference on informatics, Electronics & Vision, Dhaka, Bangladesh
7.
Zurück zum Zitat Wan CY et al (2002) PSFQ: a reliable transport protocol for wireless sensor networks. Presented in the proceedings of the ACM international workshop on wireless sensor networks and applications, Atlanta Wan CY et al (2002) PSFQ: a reliable transport protocol for wireless sensor networks. Presented in the proceedings of the ACM international workshop on wireless sensor networks and applications, Atlanta
10.
Zurück zum Zitat Sonmez C, Incel OD, SinanIsik MYD, Ersoy C (2014) Fuzzy-based congestion control for wireless multimedia sensor networks. EURASIP Journal on Wireless Communications and Networking 2014(1):63 Sonmez C, Incel OD, SinanIsik MYD, Ersoy C (2014) Fuzzy-based congestion control for wireless multimedia sensor networks. EURASIP Journal on Wireless Communications and Networking 2014(1):63
11.
Zurück zum Zitat Jan MA, Nanda P, He X, Liu RP (2014) PASCCC: Priority-based application-specific congestion control clustering protocol. Computer networks 74:92–102 Jan MA, Nanda P, He X, Liu RP (2014) PASCCC: Priority-based application-specific congestion control clustering protocol. Computer networks 74:92–102
13.
Zurück zum Zitat Chakraborty A et al (2015) Trust integrated congestion aware energy efficient routing for wireless multimedia sensor networks (TCEER). Journal of computing and information technology 2015(2):95–109 Chakraborty A et al (2015) Trust integrated congestion aware energy efficient routing for wireless multimedia sensor networks (TCEER). Journal of computing and information technology 2015(2):95–109
14.
Zurück zum Zitat Sumathi K, Venkatesan M, A Survey on Congestion Control in Wireless Sensor Networks “International Journal of Computer Applications (0975–8887), 2016, 147(6):6–11 Sumathi K, Venkatesan M, A Survey on Congestion Control in Wireless Sensor Networks “International Journal of Computer Applications (0975–8887), 2016, 147(6):6–11
16.
Zurück zum Zitat M.BalaAnand, S. Sankari, R. Sowmipriya, S. Sivaranjani "Identifying fake user’s in social networks using non verbal behavior", International Journal of Technology and Engineering System 7(2):157–161 M.BalaAnand, S. Sankari, R. Sowmipriya, S. Sivaranjani "Identifying fake user’s in social networks using non verbal behavior", International Journal of Technology and Engineering System 7(2):157–161
17.
Zurück zum Zitat Maram B, Gnanasekar JM, Manogaran G et al (2018) Intelligent security algorithm for UNICODE data privacy and security in IOT. SOCA 13:3–15 Maram B, Gnanasekar JM, Manogaran G et al (2018) Intelligent security algorithm for UNICODE data privacy and security in IOT. SOCA 13:3–15
18.
19.
Zurück zum Zitat Anupriya K, Gayathri R, Balaanand M, Sivaparthipan CB Eshopping scam identification using machine learning, 2018 international conference on soft-computing and network security, 1–7 Anupriya K, Gayathri R, Balaanand M, Sivaparthipan CB Eshopping scam identification using machine learning, 2018 international conference on soft-computing and network security, 1–7
20.
Zurück zum Zitat Sivaparthipan CB, Karthikeyan N, Karthik S (2018) Designing statistical assessment healthcare information system for diabetics analysis using big data. Multimed Tools Appl Sivaparthipan CB, Karthikeyan N, Karthik S (2018) Designing statistical assessment healthcare information system for diabetics analysis using big data. Multimed Tools Appl
21.
Zurück zum Zitat Solomon Z, Sivaparthipan CB, Punitha P, BalaAnand M, Karthikeyan N (2018) Certain investigation on power preservation in sensor networks. In: 2018 international conference on soft-computing and network security (ICSNS), Coimbatore. IEEE Xplore, 13 December 2018 Solomon Z, Sivaparthipan CB, Punitha P, BalaAnand M, Karthikeyan N (2018) Certain investigation on power preservation in sensor networks. In: 2018 international conference on soft-computing and network security (ICSNS), Coimbatore. IEEE Xplore, 13 December 2018
22.
Zurück zum Zitat BalaAnand M, Karthikeyan N, S Karthik CB (2017) Sivaparthipan “a survey on BigData with various V's on comparison of apache hadoop and apache spark”. Advances in Natural and Applied Sciences BalaAnand M, Karthikeyan N, S Karthik CB (2017) Sivaparthipan “a survey on BigData with various V's on comparison of apache hadoop and apache spark”. Advances in Natural and Applied Sciences
24.
Zurück zum Zitat Sumathi K, Venkatesan DM (2017) An effective load balanced and congestion control protocol for wireless multimedia networks. Asian Journal of Research in Social Sciences and Humanities 7(3):289–301CrossRef Sumathi K, Venkatesan DM (2017) An effective load balanced and congestion control protocol for wireless multimedia networks. Asian Journal of Research in Social Sciences and Humanities 7(3):289–301CrossRef
25.
Zurück zum Zitat Praveen S, Nagesh M (2012) Implementaion of the triple DES block cipher using VHDL. International Journal of Advances in Engineering & Technology 3, issue 1:117–128 Praveen S, Nagesh M (2012) Implementaion of the triple DES block cipher using VHDL. International Journal of Advances in Engineering & Technology 3, issue 1:117–128
26.
Zurück zum Zitat Hamdan O, Zaidan B (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157 Hamdan O, Zaidan B (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157
27.
Zurück zum Zitat Shantamurty R (2010) Implementing triple DES (TCBC) on OpenVMS. OpenVMS Technical Journal:V15 Shantamurty R (2010) Implementing triple DES (TCBC) on OpenVMS. OpenVMS Technical Journal:V15
28.
Zurück zum Zitat Al Azad A (2012) Efficient VLSI implementation of DES and triple DES algorithm with cipher block chaining concept using Verilog and FPGA. International Journal of Computer Applications 44(16):6–15 Al Azad A (2012) Efficient VLSI implementation of DES and triple DES algorithm with cipher block chaining concept using Verilog and FPGA. International Journal of Computer Applications 44(16):6–15
29.
Zurück zum Zitat Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key Management for Secure Document Access in public cloud. J Inf Sci Eng 33(3):695–712 Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key Management for Secure Document Access in public cloud. J Inf Sci Eng 33(3):695–712
30.
Zurück zum Zitat Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Journal of Computers and Electrical Engineering, Elsevier 63:232–245CrossRef Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Journal of Computers and Electrical Engineering, Elsevier 63:232–245CrossRef
31.
Zurück zum Zitat P. Pandiaraja & P. Vijayakumar, Efficient multi-keyword search over encrypted dData in untrusted cloud environment, proceedings of the 2nd international conference on recent trends and challenges in computational models (ICRTCCM’17),2017, Pages:251–256 P. Pandiaraja & P. Vijayakumar, Efficient multi-keyword search over encrypted dData in untrusted cloud environment, proceedings of the 2nd international conference on recent trends and challenges in computational models (ICRTCCM’17),2017, Pages:251–256
32.
Zurück zum Zitat Vijayakumar P, Pandiaraja P, Balamurugan B, Karuppiah M (2019) A novel performance enhancing task scheduling algorithm for cloud based E-health environment. International Journal of E-Health and Medical Communications 10(2):102–117 Vijayakumar P, Pandiaraja P, Balamurugan B, Karuppiah M (2019) A novel performance enhancing task scheduling algorithm for cloud based E-health environment. International Journal of E-Health and Medical Communications 10(2):102–117
33.
Zurück zum Zitat Sakthidevi, E. Srievidhyajanani, Secured fuzzy based routing framework for dynamic wireless sensor networks 2013 international conference on circuits, power and computing technologies,IEEE Explorer 2013, pp 1-6 Sakthidevi, E. Srievidhyajanani, Secured fuzzy based routing framework for dynamic wireless sensor networks 2013 international conference on circuits, power and computing technologies,IEEE Explorer 2013, pp 1-6
34.
Zurück zum Zitat Thota, Chandu, Revathi Sundarasekar, Gunasekaran Manogaran, Varatharajan R and Priyan M. K. Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the Convergence of Big Data and the Internet of Things. IGI Global, 2018. 141–154. Web. 23 Apr. 2019. https://doi.org/10.4018/978-1-5225-2947-7.ch011 Thota, Chandu, Revathi Sundarasekar, Gunasekaran Manogaran, Varatharajan R and Priyan M. K. Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the Convergence of Big Data and the Internet of Things. IGI Global, 2018. 141–154. Web. 23 Apr. 2019. https://​doi.​org/​10.​4018/​978-1-5225-2947-7.​ch011
35.
Zurück zum Zitat Kafia M A, Djenourib D, Othmanc J B, Ouadjaouta A, Badache N Congestion detection strategies in wireless sensor networks: a comparative study with test bed experiments” the 5th international conference on emerging ubiquitous systems and pervasive networks (EUSPN-2014) Kafia M A, Djenourib D, Othmanc J B, Ouadjaouta A, Badache N Congestion detection strategies in wireless sensor networks: a comparative study with test bed experiments” the 5th international conference on emerging ubiquitous systems and pervasive networks (EUSPN-2014)
36.
Zurück zum Zitat BalaAnand M, Sivaparthipan CB, Karthikeyan N, Karthik S Early detection and prediction of amblyopia by predictive analytics using apache spark. International Journal of Pure and Applied Mathematics 119(15):3159–3171 BalaAnand M, Sivaparthipan CB, Karthikeyan N, Karthik S Early detection and prediction of amblyopia by predictive analytics using apache spark. International Journal of Pure and Applied Mathematics 119(15):3159–3171
Metadaten
Titel
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
verfasst von
K. Sumathi
P. Pandiaraja
Publikationsdatum
23.08.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00797-1

Weitere Artikel der Ausgabe 6/2020

Peer-to-Peer Networking and Applications 6/2020 Zur Ausgabe