A. Harshavardhan, K. SHRUTHI


The Wireless Sensor Network is work of "nodes"- from a couple to a few hundreds or even thousands, where every node is associated with one sensor. A node in a wireless sensor network that is fit for playing out some procedure and accumulate sensor data and speaking with other associated nodes in the network. The nodes to perform transmissions not effectively, in light of the fact that there are a portion of the issues may emerge in that they are 1) if node disappointment will happen in any stage, 2) security issues emerges because of transmission includes number of nodes, 3) expanding transmission time because of more number of nodes will be dynamic at an opportunity to finish a specific assignment. To take care of this issue we propose new calculations are 1) node detecting and node disappointment for action identification, 2) finding courses and give security utilizing neighbourhood keys, 3) which node includes to play out the activity that present node just to be dynamic at once other to rest mode utilizing node booking plan. In this paper, we propose a novel probabilistic approach that prudently consolidates confined checking, area estimation and node joint effort to identify node disappointments in mobile wireless networks. In particular, we propose two plans. In the main plan, when a node A can't get notification from a neighbouring node B, it utilizes its own data about B and double input from its neighbours to choose whether B has fizzled or not. In the second plan, An assembles data from its neighbours, and uses the data together to settle on the choice. The principal conspire acquires bring down correspondence overhead than the second plan. Then again, the second plan completely uses data from the neighbours and can accomplish better execution in disappointment identification and false positive rates and bring about low correspondence overhead.


Mobile Wireless Networks, Node Failure, Node Failure Detection, Network Management, Fault Management.

Full Text:




  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science