CFP last date
15 January 2025
Reseach Article

Deployment of Query Validation for Finite Range Query Scheme in Wireless Sensor Networks

by S. Kumaravel
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 7
Year of Publication: 2012
Authors: S. Kumaravel
10.5120/ijais12-450579

S. Kumaravel . Deployment of Query Validation for Finite Range Query Scheme in Wireless Sensor Networks. International Journal of Applied Information Systems. 3, 7 ( August 2012), 11-20. DOI=10.5120/ijais12-450579

@article{ 10.5120/ijais12-450579,
author = { S. Kumaravel },
title = { Deployment of Query Validation for Finite Range Query Scheme in Wireless Sensor Networks },
journal = { International Journal of Applied Information Systems },
issue_date = { August 2012 },
volume = { 3 },
number = { 7 },
month = { August },
year = { 2012 },
issn = { 2249-0868 },
pages = { 11-20 },
numpages = {9},
url = { https://www.ijais.org/archives/volume3/number7/242-0579/ },
doi = { 10.5120/ijais12-450579 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:45:59.680563+05:30
%A S. Kumaravel
%T Deployment of Query Validation for Finite Range Query Scheme in Wireless Sensor Networks
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 3
%N 7
%P 11-20
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Adversary attack on wireless sensor network is a very major issue on wireless sensor networks deployment. Adversaries send the replica node as same as like original node to capture all necessary information and the key values. Deployment of a wireless sensor network (WSN) system is a significant step since hypothetical models and hypothesis habitually vary from genuine environmental uniqueness and presentation at the operation site. In addition, such systems are regularly situated in areas that are complicated to achieve or even unreachable for definite periods of time. The previous work provided a replica detection scheme with Finite Range Query (FRQ) technique to effectively recognize the mobile replica nodes (acting as adversary) and eradicate the varying query ranges of mobile sensor nodes. But it is necessary to validate the query to improve the detection of mobile replica nodes. Therefore, it is essential to validate the functionality of the scheme at the time of the operation, thus reducing the risk of untimely failures. Unintentionally, the validation reduces the cost of revisiting the position in the near prospect for re-deployment, preservation, or repairs. In this paper we present a deployment query validation framework DQV that consists of procedures for WSN status assessment and veri?cation. DQV is supported and has demonstrated the potential for early problem detection at three levels of WSN validation: wireless network physical and logical integrity, sensor node devices, and connectivity to the back-end such as a data server over the Internet. The DQV framework will validate the query at each step taken in the Wireless sensor networks. An experimental evaluation is conducted to estimate the performance of the proposed deployment of query validation for finite range query scheme in WSN [DQV-FRQ] in terms of bandwidth, delay, data loss.

References
  1. J. Ho, M. Wright, and S. K. Das, "Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing", IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 6, JUNE 2011.
  2. Zhenzhen Ye and Alhussein A. Abouzeid , "Optimal Stochastic Location Updates in Mobile Ad Hoc Networks", IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011
  3. H. Liu, L. Selavo, J. Stankovic , "SeeDTV: Deployment-Time Validation for Wireless Sensor Networks", EmNets'07, June 25–26, 2007, Cork, Ireland
  4. Byun, H. et. Al. , "Adaptive Duty Cycle Control with Queue Management in Wireless Sensor Networks", IEEE Transactions on Mobile Computing, 2012
  5. M. Dyer, J. Beutel, 'Deployment Support Network -A Toolkit for the Development ofWSNs. In Fourth European Workshop on Sensor Networks, 2007.
  6. Durmaz Incel, O. et. Al. , "Fast Data Collection in Tree-Based Wireless Sensor Networks", IEEE Transactions on Mobile Computing, Jan. 2012
  7. Chih-Kuang Lin et. Al. , "A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks", IEEE Transactions on Mobile Computing, April 2011
  8. J. Li, Y. Bai, et. Al. , . POWER: Planning and Deployment Platform for Wireless Sensot Networks. In Fifth International Conference on Grid and Cooperative Computing Workshops, 2006.
  9. Rui Tan et. Al. , "Exploiting Reactive Mobility for Collaborative Target Detection in WirelessSensorNetworks", IEEE Transactions on Mobile Computing, march 2010
  10. Shigeng Zhang et. Al. , "Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks", : IEEE Transactions on Mobile Computing, June 2010
  11. Xue Wang et. Al. , "Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks", IEEE Transactions on Mobile Computing, Jan 2010
  12. Jiang, B. et. Al. , "Probability-based Prediction and Sleep Scheduling for Energy Efficient Target Tracking in Sensor Networks", IEEE Transactions on Mobile Computing, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks Mobile replica nodes Finite range query Query validation scheme