You are on page 1of 5

A LOAD AWARE WATCHDOG SYSTEM

TOWARD ENERGY EFFICIENT IN WSN


First Author#1 and Second Author*2
#
Qualification, Department, College Name, Location,Country
*
Qualification, Department, College Name, Location,Country

Abstract- WSNTs based on the Watchdog system, to systems from being assaulted by the trust sensor
screen and distinguish the malicious node in system. nodes. Those nodes can bypass the conventional
This system is utilized to build a trust relationship, security scheme utilizing their trust personalities; yet
furthermore, subsequently gets a proficient execution in can be conceivably caught by trust frameworks
protecting the information sensing and multi-hop
because of their poor reputation or past misbehavior.
routing. This process has been demonstrated as an
extremely powerful way to deal with WSNTS's
establishments. Nonetheless, this sort of system expends
much energy and subsequently diminishes the lifespan
of WSN. In existing framework, watchdog presents a lot
of extra energy consumptions and does not give proper
solutions for lessen the energy utilization issue. Because
of those difficulties, energy utilization plays an
exceptionally critical part in WSNs. This paper reveals
the inefficiency of energy utilization of watchdog
method in existing trust frameworks and proposed a
load-aware watchdog optimization technique that
develops a mutual relationship between trust-aware and
load-aware watchdog optimization systems. An
experimental result proves the effectiveness of our
system in terms of less energy consumption, Trust
accuracy and Trust robustness. Fig.1. Wireless Sensor Network- Architecture

Keywords: Watchdog system, Trust relationship, Energy Initially, the capable base station and cluster
consumptions, Trust accuracy and Trust robustness. head, both of which are liable to have business
prerequisites to associate with the entire system [3],
I. INTRODUCTION may not situate in the communication scope of all
sensor nodes (i.e., a few nodes are remote),
A wireless sensor network is also called as a subsequently missing the chance to have direct
wireless sensor and actor network are spatially encounters of those remote node. Second, some
dispersed and independent sensors to screen the sensor nodes might not have business prerequisites to
physical or natural conditions, for example, cooperate with their neighbor nodes, or their business
temperature, sound, pressure, and so on. Nowadays associations happen at a low recurrence. The past
[1], the wireless sensor systems are bidirectional, behavior of lethargic nodes is difficult to be gathered
additionally empowering control of sensor activity. in accord to business plan. Third, since trust is
The advancement in wireless sensor systems was context-aware, the experience of one sort of practices
propelled by military applications, for example, can't be utilized to develop trust for another kind. To
battlefield surveillance, industrial process beat those difficulties and encourage past behavior
monitoring, health care monitoring etc. groupings, the greater part of existing WSNTSs have
embraced a watchdog method. Utilizing this strategy,
The WSN is constructed with several sensor nodes can work as proactive screens and also
number of nodes, where every node is associated dispatch the trust-committed tasks in a pre-
with one (or in some cases a few) sensors [2]. A basic characterized recurrence to specifically cooperate
supplement to security components, for example, with their neighborhood nodes.
cryptographic strategies, validation and access
control rationales and so on. These trust frameworks
are broadly connected to shield the wireless sensor
The rest of the paper is organized as follows: To handle those difficulties and encourage
Section II describes the existing techniques carried past behavior accumulation, the greater part of
out by various researchers; Section III describes the existing WSNTSs have received a watchdog method.
functioning of proposed system; Section IV validates This strategy designated the watchdog task; the node
the results using experimental parameters and at last performs to screen its neighbor node at time space. A
concluded in Section V. watchdog task comprises of a bidirectional
communication between the watchdog node and the
II. RELATED WORKS objective node. In any case, this strategy required a
vast measure of energy. The inefficient utilization of
In the literature, trust has been utilized as a watchdog method in existing trusts frameworks. It
part of WSNs for evaluating the accessibility, expands energy utilization in WSNTs. Sensor nodes
reliability, or security property of a node (e.g., are normally furnished with constrained battery;
whether a node is noxious or not) by considering the work in an unattended mode for a long period of
past behaviors [6]–[11]. Ganeriwal et al. [7] proposed time. And also WSNTSs do not discuss how to
a reputation-based system for information schedule watchdogs.
respectability in WSNs. The proposed reputation
framework takes data gathered by every node III. LOAD AWARE WATCHDOG
utilizing a Watchdog system to identify the invalid OPTIMIZATION SYSTEM
information and uncooperative nodes. Yao et al. [11]
proposed a parameterized and restricted trust In this section, we proposed the load aware
administration plan for WSN security, especially for watchdog strategies for WSNTSs. This method is
secure routing where every node just keeps up utilized to adjust energy productivity and security in
exceedingly preoccupied parameters to assess its terms of trust precision and robustness. The extreme
neighbors. Aivaloglou and Gritzalis [6] proposed a objective is to decrease the energy cost instigated by
crossover trust and reputation administration watchdog assignments as much as conceivable, while
convention for WSNs by joining certification based preserving the trust precision and robustness in an
and authentication based frameworks. Likewise, the adequate level. The optimization technique is
investigation was directed in light of a WSN level followed in three levels:
which is not a versatile one. Liu et al. [8] and Moraru
et al. [9] proposed trust management conventions and In the first level, to improve watchdog’s
connected them to geographic routing in WSNs. In position on given a target node to minimize the
any case, no various leveled trust management was general risks regarding both energy utilization and
considered for overseeing grouped WSNs. security. Watchdog Location Improvement method
utilizing DBP (Distance Based Probabilistic)
Capra et al. [12], [13] talked about the idea calculation to recognize the target node and make the
of human trust which could be framed from three most limited distance communication. It recognizes
sources: direct experiences, credentials and the misbehavior sensor nodes and eliminating this
recommendations. Specifically, recommendations are node using secure routing algorithm in order to
trust data originating from different nodes in the predict an efficient and trustworthy neighboring
social relationship. We consider just two sources in nodes in the networks.
our idea of trust, to be specific, direct experiences
and recommendations, since it is hard for SNs with Second level is to improve watchdog
constrained assets to convey accreditations. Shaikh frequency and decrease its redundancy. Watchdog
et al. [10] proposed a group based trust management Frequency Optimization system also proposed
plan for clustered WSNs in which every SN performs HWFA (Heuristic Watchdog Frequency Adjustment)
peer assessment in view of direct perceptions or calculation to gauge the energy units for each node.
recommendations, and, every cluster head (CH) This calculation characterizes the number of
assesses different CHs and additionally SNs under its watchdog task taken for watchdog nodes perform to
own particular cluster. However, the trust for their screen the target node inside of a period window as
situation is evaluated just in view of past the watchdog frequency.
communication experiences in message delivery,
which for our situation is just one conceivable trust Third level is to balance the load between
part alongside other social and QoS trust parts the watchdog node and target node. In Load
involving the general trust metric. Balanced Cluster Head (LBCH), the race of CH just
concerns the node’s residual energy. It could be said,
it is chosen arbitrarily in every group. The cluster
could possibly be isolated or not i.e. every node’s
energy utilization would increment. In addition, CHs IV. EXPERIMENTAL DESIGNS AND
send information directly to the BS, which might RESULTS
prompt expansive energy utilization when some of
CHs are far from the BS in large area networks. Load This Experiment is executed on Intel Core i3
Balancing Group Clustering (LBGC) utilizes multi- with CPU of 2.40 GHz and RAM of 2 GB. WSNET
hop routing strategy to lessen the CHs' energy is an occasion driven module-based WSN system. It
utilization. applies a loosely organized architecture to
modularize the sensor node’s major functionalities
However, this could bring about "hot spots" into a succession of pluggable models (e.g., the radio,
issues in sensor systems. To be specific, the CHs MAC, routing protocol stack, battery and
close to the BS will drain their energy earlier, as they applications and so forth.). Because of this adaptable
need to forward the information from CHs near from design, WSNET has drawn attention in the literature.
BS. Accordingly, we utilize uneven-grouping In this investigation, actualizing the watchdog
technique to accomplish load parity among CHs. The optimization algorithms (i.e., DBP and HFWA (E)
distance between the Group Head (GH) and BS serve algorithm as another application module to WSNET,
as grouping condition to guarantee the group close to and apply our energy utilization model.
the BS. Based on the threshold value, the watchdog
tasks are aligned and allocated. We choose μ=0.2 for HWFA algorithm to
maintain some capability against WSN’s noisy
transmission nature. Watchdog optimization
algorithms can save 91.84% (or 94.61%) energy in
average by sacrificing 1−0.9996= 0.0004 (or
1−0.9998= 0.0002) trust accuracy. The mean
estimations of trust precision/ robustness and energy
sparing over the six nodes is described. As can be
seen, we can set aside to 93.68% energy in this real
scenario and in meanwhile induce trust based
accuracy and robustness value close to 0.3613 −
0.3437 = 0.0176. Then, the experimental design is
presented as follows:

Fig.3. Node’s Initialization and the base station are fixed.

Fig.2. System workflow


Fig.4. watchdog node sends the request packet to its target node

Fig.6. Accuracy chart for existing and proposed system.

Fig.5. Similarly, the watchdog node sends RREQ packet to its


target node with predefined threshold level. Fig.7. Energy saving chart for existing and proposed system.
[4] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless
routing for wireless networks,” in Proc. 2002 ACM Int. Conf.
Mobile Computing Netw., pp. 243–254.

[5] Y. J. Kim, R. Govindan, B. Karp, and S. Shenker, “Geographic


routing made practical,” in Proc. 2005 USENIX/ACM Symp.
Networked Syst. Design Implementation, pp. 217–230.

[6] E. Aivaloglou and S. Gritzalis, “Hybrid trust and reputation


management for sensor networks,” Wireless Networks, vol. 16, no.
5, pp. 1493–1510, July 2010.

[7] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava,


“Reputation-based framework for high integrity sensor networks,”
ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1–37, May 2008.

[8] K. Liu, N. Abu-ghazaleh, and K. D. Kang, “Location


verification and trust management for resilient geographic
routing,” J. Parallel Distrib. Computing, vol. 67, no. 2, pp. 215–
228, Feb. 2007.

[9] L. Moraru, P. Leone, S. Nikoletseas, and J. D. P. Rolim, “Near


optimal geographic routing with obstacle avoidance in wireless
sensor networks by fast-converging trust-based algorithms,” in
Proc. 2007 ACM Workshop QoS Security Wireless Mobile Netw.,
pp. 31–38.
Fig.8. Trust robustness chart for existing and proposed system
[10] R. A. Shaikh, et al., “Group-based trust management scheme
V. CONCLUSION for clustered wireless sensor networks,” IEEE Trans. Parallel
Distrib. Syst., vol. 20, no. 11, pp. 1698–1712, Nov. 2009.
In this task, Watchdog Optimization
Algorithm is introduced by considering load aware [11] Z. Yao, D. Kim, and Y. Doh, “PLUS: parameterized and
localized trust management scheme for sensor networks security,”
watchdog optimization system. It can be utilized to in Proc. 2006 IEEE Int. Conf. Mobile Adhoc Sensor Syst., pp.
take care of some optimal issues. It is intended to 437–446.
minimize the length of the tour and discover the
target path. The algorithm is profoundly adaptable [12] L. Capra and M. Musolesi, “Autonomic trust prediction for
pervasive systems,” in Proc. 2006 Int. Conf. Advanced Inf. Netw.
and can be adequately used to discover most limited Applications, pp. 1–5.
path by considering very few control parameters as
contrasted and the other heuristic algorithms. The [13] L. Capra, “Engineering human trust in mobile system
study sheds light on a promising research direction to collaborations,” in Proc. 2004 ACM SIGSOFT Int. Symp.
Foundations Software Engineering.
design a load-aware watchdog optimization
technique. The watchdog node analyzes the task on [14] J. Zhang, et al., “A trust management architecture for
gathering the neighboring data. Based on this, a hierarchical wireless sensor networks,” in Proc. 2010 IEEE Conf.
threshold level is set to mutually build the trust-aware Local Computer Networks, pp. 264–267.
and load-aware watchdog optimization systems.
[14] J. Zhang, et al., “A trust management architecture for
Experimental designs and results prove the efficiency hierarchical wireless sensor networks,” in Proc. 2010 IEEE Conf.
of the system. Local Computer Networks, pp. 264–267.

REFERENCES [15] S. Rajasegarar, C. Leckie, and M. Palaniswami, “Anomaly


detection in wireless sensor networks,” IEEE Trans. Wireless
[1] J. H. Cho, A. Swami, and I. R. Chen, “A survey on trust Commun., vol. 15, no. 4, pp. 34–40, Aug. 2008.
management for mobile ad hoc networks,” IEEE Commun.
Surveys Tutorials, vol. 13, no. 4, pp. 562–583, 2011.

[2] E. M. Daly and M. Haahr, “Social network analysis for


information flow in disconnected delay-tolerant MANETs,” IEEE
Trans. Mobile Computing, vol. 8, no. 5, pp. 606–621, May 2009.

[3] R. A. Sahner, K. Trivedi, and A. Puliafito, Performance and


Reliability Analysis of Computer Systems. Kluwer Academic
Publishers, 1996.

You might also like