Energy - Efficient Localized Routing in Wireless Sensor Networks

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2013 by IJETT Journal
Volume-4 Issue-5                      
Year of Publication : 2013
Authors : S. Usha , Dr. A. Tamilarasi , K. Anbuthiruvarangan


S. Usha , Dr. A. Tamilarasi , K. Anbuthiruvarangan. "Energy - Efficient Localized Routing in Wireless Sensor Networks". International Journal of Engineering Trends and Technology (IJETT). V4(5):2012-2015 May 2013. ISSN:2231-5381. published by seventh sense research group.


Every sensor node is essential to know their location in the sensor network, even in the presence of malicious adversa ries. In that the energy conservation and scalability are critical issues in wireless sensor network. In existing algorithm combines iterative gradient descent with selective pruning of inconsistent measurements to achieve high localization and it can trac k the mobile nodes with small localization error when nodes are moving slowly. Localization is determining the geographical location of each node in the system. In Proposed algorithm called Localized Energy awareness Restricted Neighborhood , which can guarantee the energy efficiency of its localized routing in mobile sensor networks, where all nodes are moving, to estimate the relative locations of the nodes without relying on anchor nodes . Then theoretically study its critical transmission radius in d istributed networks which can calculate short distance of sensor node with hop count and route for any source sensor node and destination sensor node pairs asymptotically almost surely. In propose a framework for relocating mobile sensors in a timely, effi cient, and balanced manner, and at the same time, maintaining the original sensing topology as much as possible. Localized routing protocols, with the assumption of known position information, the routing decision is made at each node by using only local n eighborhood information. Our main goal is to predict the energy efficient sensor node and estimated short distance consumption in Wireless Sensor Networks by carefully selecting the localization routing with secure and efficient transmission.


[1] A. Baggio and K. Langendoen, “Monte - Carlo localization for mobile wireless sensor networks,” in Proc. Conf. Mobile Ad - Hoc Sens. Netw. (MSN) , HongKong, 2006.
[2] Y. Mao and M. Wu, “Coordinated sensor deployment for improving secure co mmunications and sensing coverage,” in ACM Workshop on Security of Ad - hoc and Sensor Networks , 2005, pp. 117 – 128.
[3] L. Hu and D. Evans, “Localization for mobile sensor networks,” in Proceedings of the 10th ACM Annual Intl. Conf. on Mobile Computing and Netwo rking (MobiCom) , 2004, pp. 45 – 57.
[4] A. Baggio and K. Langendoen, “Monte - carlo localization for mobile wireless sensor networks,” in Conf. on Mobile Ad - hoc and Sensor Networks (MSN) , 2006.
[5] Y. Zeng, J. Cao, J. Hong, S. Zhang, and L. Xie, “SecMCL: A secure mont e carlo localization algorithm for mobile sensor networks,” in IEEE 6th Intl. Conf. on Mobile Adhoc and Sensor Systems (MASS) , Oct. 2009.
[6] D. Liu, P. Ning, A. Liu, C. Wang, and K. Du, “Attackresistant location estimation in wireless sensor networks,” ACM Tr ansactions on Information and System Security , vol. 11, no. 4, pp. 1 – 39, 2008.
[7] N. Michael, M.M. Zavlanos, V. Kumar, and G.J. Pappas, “Distributed multi - robot task assignment and formation control,” in IEEE Intl. Conf. on Robotics and Automation , May 2008, pp. 128 – 133.
[8] M. Mauve, A. Widmer, and H. Hartenstein, “A survey on position - based routing in mobile ad hoc networks,” IEEE Network , vol. 15, no. 6, pp. 30 – 39, Nov. 2001.
[9] S. Yi, R. Wheeler, Y. Zhang, and M. Fromherz, “Localization from mere connectivity,” Proceedings of ACM Intl. Symp. on Mobile Ad - hoc Networking & Computing , pp. 201 – 212, 2003.
[10] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications & Mobile Computing (WCMC): Special Issue On Mo bile Ad Hoc Networking: Research, Trends And Applications , vol. 2, pp. 483 – 502, 2002

Cloud , encrypted data, outsourced data, encrypted search