Open Access   Article Go Back

Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks

Mandeep Kaur1 , Balwinder Singh Sohi2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 735-743, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.735743

Online published on Dec 31, 2018

Copyright © Mandeep Kaur, Balwinder Singh Sohi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mandeep Kaur, Balwinder Singh Sohi, “Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.735-743, 2018.

MLA Style Citation: Mandeep Kaur, Balwinder Singh Sohi "Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 6.12 (2018): 735-743.

APA Style Citation: Mandeep Kaur, Balwinder Singh Sohi, (2018). Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 6(12), 735-743.

BibTex Style Citation:
@article{Kaur_2018,
author = {Mandeep Kaur, Balwinder Singh Sohi},
title = {Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {735-743},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3406},
doi = {https://doi.org/10.26438/ijcse/v6i12.735743}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.735743}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3406
TI - Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Mandeep Kaur, Balwinder Singh Sohi
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 735-743
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
344 258 downloads 225 downloads
  
  
           

Abstract

WSN (Wireless Sensor Network) has to be systemized to being resource effective and extensible. The concept of task scheduling requires less task completion time, less energy consumption and proper utilization of energy with fewer energy nodes. DAG (Directed Acyclic Graph) is considered for WSN organization as of the routing redundancy for the root. This research paper has aimed to enhance the performance of DAG in WSN. For the improvement, Cuckoo Search as an optimization algorithm and Support Vector Machine as a classification algorithm is utilized. For the evaluation of the proposed work, QoS parameters, such as Throughput, PDR (Packet Delivery Ratio), Energy Consumption, Network Lifetime and Delay are considered. The proposed algorithm stood very positive results for each QoS parameter. The results are compared on the base of with and without the proposed architecture.

Key-Words / Index Term

WSN, DAG, Cuckoo Search, Support Vector Machine

References

[1]. Elson and A. Parker. Tinker, “A tool for designing data-centric sensor networks”, Information Processing in Sensor Networks, The Fifth International Conference, pp. 350-357, 2006.
[2]. A. Razaque, M. Abdulgader, C. Joshi, F. Amsaad and M. Chauhan, “P-LEACH: Energy efficient routing protocol for Wireless Sensor Networks,” 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, 2016, pp. 1-5.
[3]. R. Ramadan, K. Abdelghany, and H. El-Rewini, “SensDep: a design tool for the deployment of heterogeneous sensing devices”, In Second IEEE Work- shop on Dependability and Security in Sensor Networks and Systems, 2006.
[4]. KP Ferentinos and TA Tsiligiridis, “Heuristic dynamic clustering in wire- less sensor networks towards uniform sensing”, 15th IST Mobile & Wireless Communications Summit, Myconos, Greece, June, 2006.
[5]. Eduardo F. Nakamura, Antonio A. F. Loureiro, and Alejandro C. Frery, “Information fusion for wireless sensor networks: Methods, models, and classifications”, ACM Computing Survey, vol.39, 2007.
[6]. Vieira, Marcos Augusto M., Claudionor N. Coelho, D. C. Da Silva, and José Monteiro da Mata. "Survey on wireless sensor network devices." In Emerging Technologies and Factory Automation, 2003. Proceedings. ETFA`03. IEEE Conference, vol. 1, pp. 537-544. IEEE, 2003
[7]. Alasmary, W.; Weihua Zhuang, “The Mobility Impact in IEEE 802.11p Infra structureless Vehicular Networks,” in Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd , vol., no., pp.1-5, 6-9 Sept. 2010
[8]. Sandra Sendra, Jaime Lloret, Miguel García and José F. Toledo, “Power saving and energy optimization techniques for Wireless Sensor Networks”, IEEE, Vol.6 pp. 439-452, 2011.
[9]. Akyildiz, I.F.; Weilian Su; Sankarasubramaniam, Y.; Cayirci, E., “A survey on sensor networks,” in Communications Magazine, IEEE, vol.40, no.8, pp.102-114, Aug 2002.
[10]. S. Xu and T. Saadawi, “Does the IEEE802.11 MAC protocol work well in multi hop wireless ad hoc networks?", IEEE Commun. Mag., vol. 39, pp.130 -137 2001.
[11]. Toumpis, Stavros; Goldsmith, A.J., “Capacity regions for wireless ad hoc networks,” in Wireless Communications, IEEE Transactions on , vol.2, no.4, pp.736-748, July 2003.
[12]. M. Kaur and A. Sharma, “Routing in WSN network using neural Network (NN) and SPEED protocol,” 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India, 2016, pp. 161-167.
[13]. X. Wang, H. Cheng and Y. Yao, “Addressing-Based Routing Optimization for 6LoWPAN WSN in Vehicular Scenario,” in IEEE Sensors Journal, vol. 16, no. 10, pp. 3939-3947, May15, 2016.
[14]. U. Raza, A. Camerra, A. L. Murphy, T. Palpanas and G. P. Picco, “What does model-driven data acquisition really achieve in wireless sensor networks?,”2012 IEEE International Conference on Pervasive Computing and Communications, Lugano, 2012, pp. 85-94.
[15]. S. Ghosh, S. Mondal and U. Biswas, “Fuzzy C Means based Hierarchical Routing Protocol in WSN with Ant Colony Optimization,” 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Bangalore, India, 2016, pp. 348-354.
[16]. A. Sharma and P. Lakkadwala, “Performance comparison of reactive and proactive routing protocols in Wireless Sensor Network,” Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, 2014, pp. 1-6.
[17]. B. Paul, K. A. Bhuiyan, K. Fatema and P. P. Das, “Analysis of AOMDV, AODV, DSR, and DSDV Routing Protocols for Wireless Sensor Network,” 2014 International Conference on Computational Intelligence and Communication Networks, Bhopal, 2014, pp. 364-369.
[18]. A. Komathi and M. Pushparani, “Trust performance of AODV, DSR and DSDV in wireless sensor networks,” Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014, Coimbatore, 2014, pp. 423-425.
[19]. S. Li, W. Dai and S. Zhang, “NS2 Enabled Multi-Routing-Protocol Simulating of Wireless Mesh Networks,” 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 2012, pp. 1-4.
[20]. H. Jin, L. Ren and Y. Ding, “A Hierarchical Wireless Routing Protocol for Multi-Channel Multi-Interface Ad Hoc Networks,” 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, 2011, pp. 1-4.
[21]. L. He, J. Huang and F. Yang, “A noval hybrid wireless routing protocol for WMNs,” 2010 International Conference on Electronics and Information Engineering, Kyoto, 2010, pp. V1-281-V1-285.
[22]. A. Rahimi and A. Harati, “CGSR features: Toward RGB-D image matching using color gradient description of geometrically stable regions,” 2015 2nd International Conference on Pattern Recognition and Image Analysis (IPRIA), Rasht, 2015, pp. 1-6.
[23]. H. Raza, P. Nandal and S. Makker, “Selection of cluster-head using PSO in CGSR protocol,” 2010 International Conference on Methods and Models in Computer Science (ICM2CS-2010), New Delhi, 2010, pp. 91-94.
[24]. T. P. Venkatesan, P. Rajakumar and A. Pitchaikkannu, “Overview of Proactive Routing Protocols in MANET,” 2014 Fourth International Conference on Communication Systems and Network Technologies, Bhopal, 2014, pp. 173-177.
[25]. L. Mejaele and E. Oketch Ochola, “Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols,” 2016 Information Security for South Africa (ISSA), Johannesburg, 2016, pp. 62-68.
[26]. L. Mejaele and E. Oketch Ochola, “Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols,” 2016 Information Security for South Africa (ISSA), Johannesburg, 2016, pp. 62-68.
[27]. N. Bilandi and K. Kaur, “Performance analysis of propagation structures on DSR routing protocol in mobile ad-hoc networks,” 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016, pp. 445-449.
[28]. B. K. Joshi and M. Soni, “Security assessment of AODV protocol under Wormhole and DOS attacks,” 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India, 2016, pp. 173-177.
[29]. A. Sharma and R. Kumar, “Performance comparison and detailed study of AODV, DSDV, DSR, TORA and OLSR routing protocols in ad hoc networks,” 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India, 2016, pp. 732-736.
[30]. K. Madhuri, N. K. Viswanath and P. U. Gayatri, “Performance evaluation of AODV under Black hole attack in MANET using NS2,” 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, 2016, pp. 1-3.
[31]. Y. Sun, F. Jiang, T. Liang and C. Phillips, “Enhanced Associativity-Based Multicast Routing protocol in CR Mobile Ad hoc Networks,” 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), Washington DC, 2014, pp. 1233-1237.
[32]. B. Preveze and A. Şafak, “Associativity Tick Averaged Associativity based Routing (ATAABR) for real time mobile networks,” 2009 International Conference on Electrical and Electronics Engineering - ELECO 2009, Bursa, 2009, pp. II-208-II-212.
[33]. R. Dube, C. D. Rais, Kuang-Yeh Wang and S. K. Tripathi, “Signal stability-based adaptive routing (SSA) for ad hoc mobile networks,” in IEEE Personal Communications, vol. 4, no. 1, pp. 36-45, Feb 1997.
[34]. A. Chandra and S. Thakur, “Performance evaluation of hybrid routing protocols against network layer attacks in MANET,” 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2015, pp. 239-244.
[35]. C. Y. Aung, P. H. J. Chong and R. J. Cai, “Hybrid opportunistic routing in highly dynamic MANET,” 2014 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, 2014, pp. 1-6.
[36]. S. A. Alharthi and P. A. Johnson, “Threshold sensitive heterogeneous LEACH protocol for wireless sensor networks,”2016 24th Telecommunications Forum (TELFOR), Belgrade, 2016, pp. 1-4.