International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 Energy Conservation Using Wireless Sensor Network Geeta Shirke1, Prof.Mrs. Shoba Krishanan2 1 V.E.S.I.T., Mumbai. geeta28shirke@gmail.com 2 H.O.D, V.E.S.I.T., Mumbai john.doe@email.com ABSTRACT In recent years, the growing interest in the WIRELESS SENSOR NETWORK (WISENET) is increases. WSNs among transmitonly nodes are attracting new concentration due to their recompense in sustaining applications requiring intense and long-lasting employment at a very low cost and energy conservation. This work also proposes a new MAC layer protocol framework called Robust Asynchronous Resource Estimation (RARE) that capably and consistently manages the closely deployed single-hop cluster in a self-planned manner. The future structure is shown to assemble the desires of most applications in terms of the energy consumption, , system capacity , reliability., QoS discrimination, and data delivery probability. Keywords: Wireless Sensor Networks (WSN); Target Tracking; Energy Efficiency; Energy Conservation, Network lifetime; Data Accuracy. 1. INTRODUCTION Wireless sensor network (WISENET) is extensively considered as one of the most important technologies of the twentyfirst century. The sensing electronics measure the ambient conditions related to the atmosphere surrounding the sensors and convert them into an electrical signal.A wireless sensor network (WISENET) consists of computing, data processing, and communicating components with battery-operated sensor devices. In a WSN, the sensor nodes can be deployed in prohibited environments, such as factories, homes, or hospitals, etc. They also can be deployed in uninhibited environments, such as disaster or hostile areas or in a particular battlefield, where monitoring and observation is crucial. Clearly, security in a WSN is tremendously essential for both prohibited environments (e.g., health-care, automation in transportation, etc.) and uninhibited and hostile environments (e.g., environmental monitoring, military command and control, battlefield monitoring, etc.). 2 SENSOR NODE In order to realize a sensor node (See Figure 1), it is implemented the following classes: 2.1 Sensor Protocol Stack Sensor Protocol Stack includes the following classes: 2.1.1 Sensor Phy Sensor Phy is known as the sensor physical layer. [6] If Sensor Phy exists in the protocol stack of a sensor node, its role is to receive a stimulus (signal) from the sensor channel generated by a target node, the location of the target node and power at the time of generating the stimulus was generated. Sensor Phy then queries the sensor transmission model to calculate the received power (Pr) signal. The current location of the target node, the location of the sensor node at the time of generating the signals, and the power with which the stimulus was generated are included in the query. If received power (Pr) is below a certain getting threshold (which is one of the part variables of Sensor Phy), the signal is deleted; otherwise, it is forwarded up to the higher layer in the sensor protocol stack. 2.1.2 Sensor agent Sensor Agent is known as the sensor layer. Sensor Agent receives the signals from the lower layer (Sensor Phy) in the sensor protocol stack, its role is to computes/extracts the application-specific data (e.g., the power and duration of the signals, the signal-to-noise ratio (SNR), or the location of the target node), and transmitted it up to the sensor application layer. Organized By: Vivekananda Education Society’s Institute of Technology International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 2.2 Sensor Application and Transport Layers Sensor Application & Transport Layer includes following classes: 2.2.1 Sensor app Sensor App implements the sensor application layer. SensorApp receives the application specific data from SensorAgent, performs certain in-network processing tasks, and passes the resulting data digest down to the transport layer. The digest goes through the wireless protocol stack and will eventually be transmitted over the wireless channel to the sink node. 2.2.2 Sensor packet Sensor Packet is known as the data packet that will be transmitted over the wireless channel. SensorPacket can be either unicast to a definite target (e.g., the sink node) or broadcast. SensorPacket is a subclass of Packet, which is transmitted over wired/wireless networks. ID RT Sensor App CPU Model Battery Model Wireless Agent Adhoc Routing Pkt Dispatcher LL Queue Sensor Agent Radio Model ARP Sensor Phy Sensor Propagation Model Sensor Node MAC_802_11 Wireless Propagation Model Sensor Mobility Model Wireless Phy Sensor Node Position Tracker Sensor Channel Medium Wireless Channel Node Position Tracker Figure 1. Architecture of a sensor node (dashed line) with its connections to other components. 2.2.3 Wireless Agent Wireless Agent is known as a transport layer between the sensor application layer and the wireless protocol stack of a sensor node. Wireless Agent is a subclass of Protocol, for implementing transport protocols. 2.3 Wireless protocol stack Wireless Protocol Stack of a sensor node is built in a plug-and-play fashion. 2.3.1 Pkt dispatcher Pkt Dispatcher provides the functionality of the IP layer (i.e., the data delivery services to the upper/lower of IP layer protocols). Specially, it forwards incoming packets to suitable set of output ports an attached to either an upper layer protocol or a lower layer component. 2.3.2 ARP ARP is known as the address resolution protocol (ARP). It maintains an ARP Table; each entry in that table proceedings the IP address of a node and the MAC address of the receiving wireless card of that node. ARP updates ARP Table by sending/receiving ARP demand and reply packets to/from the neighboring nodes. Organized By: Vivekananda Education Society’s Institute of Technology International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 2.3.3 Ll LL is known as the link layer functions. It receives queries ARP (by doing an ARP resolve) to find out the MAC address of the next hop and unicast internet protocol (IP) packets to which the this packet should be forwarded. Specifically, link layer (LL) constructs an ARP indenture. Message aim as an ARP resolve packet and sends it to ARP. Upon receiving that resolve demand, ARP looks up its ARP Table to find out a consequent entry. If a related entry cannot be found, ARP initializes an ARP request and reply process to determine the correct mapping of IP address and medium access control (MAC) address. 2.3.4 Queue Queue is a subclass of Active Queue, a queue that interacts with a data pulling element. Specially, Active Queue accepts an illogical signal from the data pulling element, which triggers a dequeue. The dequeued data is sent at an output port, if the queue is empty, Active Queue actively sends out the data having to do the pulling again. (Multiple pulling when the queue is empty results in only one time of active sending.) Application Layer Application API Control Plane Controller Sensor Open Flow Data Plane Match Traf-gen Sensing h/w In-net proc Sensor Node Action SRC DST . CAV1 CAV2 . Drop . Ctrler . . Sensor Node port1 … … … … Sensor Node Figure 2. Software-defined wireless sensor network. 2.3.5 Mac_802_11 Mac_802_11 generates the IEEE 802.11 MAC protocol. Outgoing IP and ARP packets are buffered in the Queue element. Whenever Mac_802_11 finishes the propagation of an outgoing packet, it sends a illogical signal to Queue. In addition, Mac_802_11 sends link collapse announcement messages to the ad hoc routing component in the case of link failures. 2.3.6 Wireless propagation model Wireless Propagation Model is nothing but the radio propagation model over the wireless channel. There are three radio transmission models that have been created in the wireless network extension: Free Space Model, Two-ray Ground Model, and Irregular Terrain Model. 2.3.7 Wireless phy Wireless Phy is known as functionalities of the wireless physical layer of a wireless card. Wireless Phy sends MAC frames over the wireless channel. Different propagation powers can be defined in Wireless Phy. The consignment (Inlet-Packet or ARP packet) of the received MAC frame is then forwarded to link layer (LL). Link Layer dispatches the consignment to ARP if it is an ARP packet; otherwise, it forwards it to Pkt Dispatcher if it is an Inlet-Packet. The sensor node also includes the battery, CPU and radio model. When a MAC frame is received over the wireless channel, Wireless Phy queries Wireless Propagation Model to find out whether that MAC frame can be decoded, sensed or not. If it can be decoded properly or exceeds the carrier sense sensitivity threshold, the MAC frame is passed to Mac_802_11. 3 SOFTWARE-DEFINED WSN (SD-WSN) Software-Defined WSN (SD-WSN), a structural design featuring a comprehensible division between a data and a control plane, and Sensor Open Flow (SOF), the core component of SD-WSN as a standard communication protocol between the two planes. This structural design [4], [3] is depicted in Figure 2. The whole idea is to make the original network (i.e., data plane) programmable by manipulating a user-customizable flow table on each sensor via SOF. Organized By: Vivekananda Education Society’s Institute of Technology International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 3.1 Data Plane: Creating Flows In the data plane, as per flows packets are handled. A flow is user-customizable (i.e. programmable) set of packets that share certain properties precise by a Match in a flow-table same flow and be imposed an Action (e.g., “send to port 1”) entry, or flow entry for short. The “IP source address is 10.0.*.*”, and packets that match it will be treated as in the specified by the same flow entry. 3.2 Control Plane: SOF Channel An Open Flow channel is used to transmit control messages between a controller and a switch an end-to-end connection. An SOF channel is similarly defined. However, this channel have to give TCP/IP connectivity for unfailing end-to-end in-order message release, and the two end-parties are recognized using IP addresses. These are usually not available in WSN and need to be addressed. 3.3 Overhead of Control Traffic SDN can multitude the Open Flow channel out of band, i.e., using a separate committed network. This is usually not sensible for WSN and the SOF channel has to be hosted in band i.e., by the WSN itself. Thus, the resource constrained WSN will have to furthermore carry control traffic between controllers and sensors. 3.4 Traffic Generation End-users are considered marginal to SDN and hence out of the scope of Open Flow. On the dissimilar, sensor nodes behave like endusers by generating data packets, in addition to just forwarding data as Open Flow switches do. 3.5 In-network processing At times, WSN have to process data in-situ, e.g. execute data aggregation or decision fusion, in order to reduce data redundancy and protect network resource such as bandwidth and energy. This is another feature missing in SDN. 3.6 Backward and Peer Compatibility Sensor Open Flow be supposed to desirably make available backward compatibility, with respect to traditional (non-Open Flow and non-SOF) networks, so as to guard birthright investments. It is also attractive for SOF to offer peer compatibility, i.e. to be compatible with Open Flow networks which are parallel being developed and uniform, for interoperability purposes. 4 PROTOCOLS FOR WIRELESS SENSOR NETWORK (RARE PROTOCOL) General idea of Robust Asynchronous Resource Estimation (RARE) [1], [2] is a MAC layer protocol structure designed to manage the process of the low cost, low power and heavily deployed hybrid WSN within a single-hop communication range. As shown in (See Figure 3), the RARE structure made up of CORE stack and optional FEATURE stack. It handles the transmit-only nodes and standard nodes in different ways: transmit-only low priority (LP) nodes admittance the channel randomly and will respond to no sink control as designed in underlying Qos Aware MAC Protocol using Optimal Retransmission (QoMoR), while channel admittance of the standard High priority (HP) nodes is managed by the sink. From the perception of operation phase, the RARE structure consists of two phases, the initialization phase and the stable phase. 4.1 The QoMoR Scheme The QoMoR scheme is the essential element in the core stack and governs the random communication. The optimal number of transmissions is recalculated based on the system prerequisite (e.g., data delivery probability, transmission rate, packet size, etc.) 4.2 The Asynchronous Resource Evaluation of Asynchronous Resource (ARE) Scheme, it is another fundamental component in the core stack and serves as an abstraction layer of the fundamental components. It defines the asynchronous message and supports resource inference that is performed during the initialization phase and used by the scheduling scheme. 4.2.1 Resource Estimation The empty time slots are definite as the resource of the planned RARE structure. The sink estimates the empty time space and generates the empty time slots for the complete function through the ARE scheme. In the ARE scheme, accident-free scheduling is achieved through low priority (LP) data transmission inference. This is because in QoMoR each low priority (LP) node uses a Pseudo random Number Generator (PRNG) with a separate seed to pick its random communication time. 4.2.2 Asynchronous Communication A different key proposal of the ARE scheme is asynchronous communication. In order to preserve energy, all the High Priority (HP) nodes are designed to stay in the SLEEP mode on every time possible. ARE scheme provides an asynchronous move toward sandwiched between the sink and the nodes (we assume there is no travel clock on the nodes in this work). 4.3 Constrained scheduling scheme The constrained scheduling scheme is the most important element of the core stack, throughout which the sink manages all interactions of the High Priority (HP) nodes. The improvement components in the upper feature stack also rely on this scheme to program unusual operations contained by the available time slots during each intermission. Organized By: Vivekananda Education Society’s Institute of Technology International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 4.3.1 The Stable Phase The stable phase starts from the subsequently intermission immediately after the initialization phase. The High Priority (HP) nodes will pursue the finest communication schedule generated by the sink whereas the Low Priority (LP) nodes still execute best possible random transmission within each Time slot (T). Note that unusual purpose scenarios may result in different scheduling schemes. Below we describe the Scheduled drag move toward used by this work. 4.3.2 The scheduled pull approach The sink receives data packets and sends Pull commands to each High Priority (HP) node throughout the available time slots. Dissimilar from predictable pull style approaches, this approach eliminates energy dissipate on channel sensing and idle listening through the Prescheduled process. The approach contains three steps: scheduling; transmission and reception check; and other rounds of transmission and reception check if necessary. Figure 3. RARE protocol framework. 4.4 The ROBUST Scheme The ROBUST scheme is an improvement module on the FEATURE stack to address these issues and to assurance the nodes of high priority category will still get together high-performance requirement. Fundamentally, it utilizes the available time slot resource in each intermission and redundancy in the packet formation to handle possible packet loss and support dynamic network change. 4.5 The hp assist scheme The HP Assist scheme is another development that works on the FEATURE stack. The purpose of this scheme is to develop the data delivery ability of the Lower Priority (LP) nodes with the assistance of selected High Priority (HP) nodes. Purposely, as shown in Figure 4: The sink predicts the probable failed Lower Priority (LP) data transmission by checking the overlap of all the transmissions during current time slot (T), and identifies the probable unsuccessful Lower Priority (LP) nodes (that might not have at least one data packet delivered during the interval); then the sink tries to allocate each of these unsuccessful Lower Priority (LP) nodes to the existing active High Priority (HP) nodes. A available time slot at the end of the intermission is also programmed for each assigned High Priority (HP) node to send the received Lower Priority (LP) data to the sink (call this relay transfer); before sending the Pull command, the sink attaches the data relay time (e.g., t3) and propagation time of the assigned Lower Priority (LP) node (e.g., t1; t2). 4.6 Layer protocol design support Finally is the support for the cross-layer protocol proposed for upper layer protocol. Get multi cluster communication for paradigm, due to the arbitrary nature of the Low Priority (LP) node propagation, any sloppy communication between the hybrid WSN clusters could be damaged and affect obtainable propagation too. All upper layer protocols should use the available time slot data from the MAC layer for more efficient and reliable communications, as well as improved function strategies. Organized By: Vivekananda Education Society’s Institute of Technology International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 Figure 4. Description of the HP assist scheme. 5 CONCLUSION AND FUTURE SCOPE In this paper, we have projected the RARE protocol structure to direct the single hop cluster system. This WSN cluster structural design finds high-quality operation tradeoffs between the traditional and transmit-only WSNs. The system has been exposed to have extensively improved data delivery capability in both HP and LP priority categories as well as the optimized energy consumption compared to the transmit-only WSNs. Future work includes implementation of protocol to highlight the strengths and weaknesses of the proposed protocol in real time environment. The sensor node capture attack but it also provides sufficient defence against it, to achieve and maintain good security level. 6 ACKNOWLEDGMENT The Research work of this conference paper has been carried out to meet the academic requirements of VESIT, Mumbai for the completion of Masters of Engineering in Electronics and Telecommunication. I would like to put on record, my appreciation and gratitude to all who have rendered their support and input. Without them, it would not have been possible for me to shape this study. I have received immense guidance from my guide Prof. Mrs. Shoba Krishnan, Professor and Head of the Electronics and Telecommunication Department, VESIT, Mumbai. I would therefore like to convey my sincere gratitude to her. 7 REFERENCES [1] Jia Zhao, Student Member, IEEE, Chunming Qiao, Fellow, IEEE, Raghuram S. Sudhaakar, Member, IEEE, and Seokhoon Yoon, Member, IEEE,“Improve Efficiency and Reliability in Single-Hop WSNs with Transmit-Only Nodes” IEEE Transaction on Parallel and Distributed Systems, Vol. 24, no. 3, March 2013. [2] Subramanian Ganesh and Ramachandran Amutha, “Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms” Journal of Communications and Networks, Vol. 15, no. 4, August 2013. [3] Azrina Abd Aziz, Y. Ahmet S¸ekercio˘glu, Paul Fitzpatrick, and Milosh Ivanovich,” A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, Vol. 15, no. 1, First Quarter 2013. [4] Tie Luo, Hwee-Pink Tan, and Tony Q. S. Quek,” Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks ”, IEEE Communications Letters, Vol. 16, no. 11, November 2012. [5] Yi qian and keijie lu, university of Puerto rico Mayaguez david tipper, university of pittsburh, ”A Design for Secure and Survivable Wireless Sensor Network”, 2007 IEEE. [6] Ahmed Sobeih, Jennifer C. Hou, Lu-Chuankung, Ningli, And Honghai Zhang, University of Illinois at Urbana-Champaign WeiPeng Chen, Fujitsu Labs of America Hung Tyan , National Sun Yat- Sen University,”J-SIM: A Simulation And Emulation Environment for Wireless Sensor Network”,IEEE Wireless Communications • August 2006. Organized By: Vivekananda Education Society’s Institute of Technology International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org ISSN 2319 - 4847 Special Issue for International Technological Conference-2014 AUTHOR Geeta Shirke was born on 28 December 1985. She received the Bachelor of Engineering degree in Instrumentation from Rajiv Gandhi Institute of Technology, Mumbai, India, in 2008. Currently, she is pursuing the Master of Engineering degree in Electronics and Telecommunication from Vivekanand Education Society’s Institute of Technology, Mumbai, India. She has 2 years of teaching experience. Shoba Krishnan received her B.E degree from VRCE, Nagpur University in 1983 and M.E degree from VJTI,Mumbai University in 1999.She has been a faculty member at VESIT, Mumbai since 1987.At present she is working as HOD, Electronics and Telecommunications Department. Her areas of research are Microwave, Optical & Wireless Communications. She has more than 50 publications in International Conferences and reputed journals. Organized By: Vivekananda Education Society’s Institute of Technology