Professional Documents
Culture Documents
I.
INTRODUCTION
PROPOSED TECHNIQUE
Numbe
r
of
nodes
End 2
end
delay
Throug
hput
Energy
consumption
Cost=
energy
*delay
50
0.525
11.21
0.389
0.204
100
0.720
12.21
0.394
0.283
150
0.915
12.51
0.392
0.358
200
1.02
13.0
0.395
0.402
umber
of
nodes
End 2
end
delay
Throug
hput
Energy
consumption
Cost=
energy
*delay
50
0.515
11.31
0.379
0.195
100
0.714
12.37
0.384
0.274
150
0.910
12.62
0.382
0.347
200
1.01
13.1
0.383
0.386
Numbe
r
of
nodes
End 2
end
delay
Throug
hput
Energy
consumption
Cost=
energy
*delay
50
0.5000
11.51
0.369
0.184
100
0.696
12.69
0.373
0.259
150
0.890
13.0
0.372
0.331
200
0.99
13.2
0.373
0.369
Energy Consumption
0.4
E
n
e
r
g
y
0.39
PEGASIS
0.38
0.37
AIS-PEGASIS
0.36
0.35
50 100 150 200
Modified AISPEGASIS
Number of Nodes
PEGASIS
AIS-PEGASIS
Modified AISPEGASIS2
Number of Nodes
COST=ENERGY*DELAY
0.5
C 0.4
O
S 0.3
T
0.2
PEGASIS
Modified AISPEGASIS
0.1
AIS-PEGASIS2
0
50
Number of Nodes
V. CONCLUSION
The work mainly focuses on the mapping of the human
body with the sensor network and implementation of the AIS
to enhance the network performance. This work proposes an
algorithm named Modified AIS-PEGASIS by introducing the
AIS in the PEGASIS algorithm. Modified AIS-PEGASIS is a
secure and efficient algorithm which can detect and recover
various network layer attacks. The simulation is done using
the MATLAB, and the results conforms the better
performance of Modified AIS-PEGASIS protocol as
compared to PEGASIS protocol. In future, the AIS can be
implementing on various other protocols of WSN to enhance
the network lifetime.
References
[1] Saleem k, et al., Energy Efficient Information Assured
Routing based on Hybrid Optimization Algorithm for WSNs,
2013 10th International Conference on Information
Technology: New Generations.
[2]Dasgupta, Dipankar. "Advances in artificial immune
systems." Computational intelligence magazine, IEEE 1.4
(2006): 40-49.
[3] Forrest, S. et al., "Self-nonself discrimination in a
computer" (PDF), Proceedings of the 1994 IEEE Symposium
on Research in Security and Privacy, Los Alamitos, CA. pp.
202212, (1994).
[4] Hunt, J. E. & Cooke, D. E., Learning Using an Artificial
Immune System, Journal of Network and Computer
Applications, 19, pp. 189-212, 1996
[5]Dasgupta, D., Artificial Neural Networks and Artificial
Immune Systems: Similarities and Differences, Proc. of the
IEEE SMC, 1, pp. 873-878, 1997.
[6]McCoy, D. F. & Devaralan, V., Artificial Immune
Systems and Aerial Image Segmentation, Proceedings of the
SMC97, pp. 867-872, 1997.