SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1949
NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE
RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING
PROTOCOLS
G.ELANAGAI1 C.JAYASRI2
1PG Scholar, Dept. of ECE
2Assistant Professor, Dept. of ECE
AVC College of Engineering , Mannampandal, Mayiladuthurai.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Creation of Energy-Efficient Cognitive Radio
model is a challenging task. There are many traditional
methods which are highly energy efficient, but it does not
bother about network security. Hence in this paper we are
comparing different wireless routing protocols and find best
protocol to create energy efficient Cognitive Radio network
(CRN) model having attacker nodes in it. Finally energy
consumption comparison graph was generatedbetweenthose
routing protocols and finds the efficient model i.e. thecreation
of energy efficient CRN model.
Key Words: Network Security,Energy Efficiency,Cognitive radio
(CR), X Graph
1. INTRODUCTION
Cognitive radio is a Software-defined radio that can
able to access unused radio spectrum holes efficiently. The
definition adopted by Federal CommunicationsCommission
(FCC):“Cognitive radio: A radio or system that senses its
operational electromagnetic environment and can
dynamically and autonomously adjust its radio operating
parameters to modify system operation, such as maximize
throughput, mitigate interference, facilitateinteroperability,
access secondary markets.” Cognitive radio (CR) techniques
provide the capability of detecting spectrum holes and
sharing the spectrum in an opportunistic manner. DSA
techniques can select the best available channel from the
spectrum pool for CR devices to operate [4]. More
specifically, CR enables secondary users (SUs) to perform a
series of operations as follows: 1) spectrum sensing to
predict what spectrum is available and recognize the
presence of the primary user (PU) when a PU reoccupiesthe
licensed channel; 2) spectrummanagementtoselectthe best
available channel from the spectrum pool for special
services; 3) spectrum sharing to coordinate access to all
available channels with other SUs; and 4) spectrummobility
to vacate the channel as soon as possible when a PU is
detected [4]. Spectrum sensing is one of the most important
components in the cognition cycle .Routing protocols plays
an important role to choose an efficientCRN model.Hence in
this paper we are going to compare the reactive, Proactive
and Hybrid routing Protocols. The below figure 1.1
shows the basic cognition cycle [13].
2. WIRELESS ROUTING PROTOCOLS
Figure 2.1 Routing Protocols Classification
Wireless Routing
protocols
Eg: AODV,
DSR
Reactive Proactive
Hybrid Eg: DSDV,
OLSR
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1950
 Reactive (AODV,DSR,TORA) on demand
 Proactive (DSDV,OLSR,WRP) table driven
 Hybrid (ZRP) combination of reactive and
proactive.
In this paper we are going to compare three routing
protocols to choose the best one.
2.1 Reactive Protocol
Reactive Protocol has lower overhead since routes
are determined on demand. It employs flooding (global
search) concept. Constantly updatingofroutetables with the
latest route topology is not required in on demand concept.
Reactive protocol searches for the route in an on-demand
manner and set the link in order to send out and accept the
packet from a source node to destination node. Route
discovery process is used in on demand routing by flooding
the route request (RREQ) packets throughout the network.
Examples of reactive routing protocols are the dynamic
source Routing (DSR), ad hoc on-demand distance vector
routing (AODV).
2.1.1 AODV
Adhoc-Ondemand–Distance-Vectoristhealgorithm
used here it enables dynamic, multihop routing betweenthe
nodes.It allows the nodes to obtain the routes quickly and
the operation is loop-free one and it has setup of
reverse/forward pointers. The major advantage of this
algorithm is it avoids link breakage, AODV causes affected
set of nodes to be notified, so we can invalidate the route
using lost link. Route Request (RREQ’s), Route Replies
(RREP’s) and Route Errors (REER’s) are the message types
defined by AODV algorithm.
Advantages of AODV
Highly suitable for more number of nodes.Use of
periodic indication messages to track neighbours the
messages supporting the routes maintenance are range-
limited, so they do not cause unnecessary overhead in the
network. The connection setup delay is less. RERR (Route
error) is defined so we can avoid link breakage.
2.1.2 DSR
DSR uses source routing concept. When packets
are flooded by a source node, the sender node caches
complete hop-by-hop routetothereceivernode.These
route lists are caches in a route cache. The datapackets
carry the source route in the packet header. DSR uses
Route Discovery process to send the data packetsfrom
sender to receiver node for which it does not already
know the route; it uses a route discovery process to
dynamically determine such a route. In Route
discovery DSR works by flooding the data packets in
network with route request (RREQ) packets. RREQ
packets are received by every neighbor nodes and
continue this flooding process by retransmissions of
RREQ packets, unless it gets destination or its route
cache consists a route for destination .Such a node
replies to the RREQ with a route reply (RREP) packet
that is routed back to real source node .source routing
uses RREQ and RREP packets. The RREQ builds up the
path traversed across the network. The RREP routes
itself back to the source by traversing this path toward
the back. The source caches backward route by RREP
packets for upcoming use. If any connection on a
source route is wrecked, a route error (RERR)packetis
notified to the source node.
2.2 Proactive Protocol
Each node in the network has routing table for
the broadcast of the data packets and want toestablish
connection to other nodes in the network.Thesenodes
record for all the presented destinations, number of
hops required to arrive at each destination in the
routing table. The routing entry is tagged with a
sequence number which is created by the destination
node. To retain the stability, each station broadcasts
and modifies its routing table from time to time. How
many hops are required to arrive that particular node
and which stations are accessible is result of
broadcasting ofpacketsbetweennodes.Eachnodethat
broadcasts data will contain its new sequencenumber.
The proactive protocols are appropriate for less
number of nodes in networks, as they need to update
node entries for each and every node in the routing
table of every node. It results more Routing overhead
problem. There is consumption of more bandwidth in
routing table. Example of Proactive RoutingProtocol is
Destination Sequenced Distance Vector (DSDV).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1951
2.2.1 DSDV
The DSDV routing protocol is an enhanced
version of the distributed Bellman-Ford algorithm
where each node maintain a table that contain the
shortest distance and the first node on the shortest
path to every other node in the network. Each node,
upon receiving an update, quickly disseminatesittoits
neighbors in order to propagate the broken-link
information to the whole network. Thus a single link
break leads to the propagation of table update
information to the whole network.
Advantage
It can be applied to MANETs with few
modifications. The updatesarepropagatedthroughout
the network in order to maintain an up-to-date viewof
the network topology at all the nodes.
Disadvantages
(1) The DSDV suffers from excessive control
overhead that is proportional to the number of nodes
in the network and therefore is not scalable in
MANETs, which have limited bandwidth and whose
topologies are highly dynamic.
(2) In order to obtain information about a
particular destination node, a node has to wait for a
table update message initiatedbythesamedestination
node. This delay could result in stale routing
information at nodes.
2.2.2 OLSR
Optimized Link State Protocol (OLSR) is a
proactive routing protocol, so the routes are always
immediately available when needed. OLSR is an
optimization version of a pure link state protocol. So
the topological changes cause the flooding of the
topological information to all available hosts in the
network. To reduce the possible overhead in the
network protocol uses Multipoint Relays (MPR). The
idea of MPR is to reduce flooding of broadcasts by
reducing the same broadcast in some regions in the
network, more details about MPR can be found later in
this chapter. Another reduce is to provide the shortest
path. The reducing the time interval for the control
messages transmissioncanbringmorereactivitytothe
topological changes.
Advantages
OLSR is also a flat routing protocol; it does not
need central administrative system to handle its
routing process. The proactive characteristic of the
protocol provides that the protocol has all the routing
information to all participated hosts in the network.
However, as adrawbackOLSRprotocolneedsthateach
host periodic sends the updated topology information
throughout the entire network, this increase the
protocols bandwidth usage. But the flooding is
minimized by the MPRs, which are only allowed to
forward the topological messages.
2.2.3 Hybrid Routing Protocol (HRP)
HRP is a hybrid protocol that separates the
network into several zones, which makes a
hierarchical protocol as the protocol ZHLS (zone-
based hierarchical link state). HRP is based on GPS
(Global positioning system), which allows each node
to identify its physical position before mapping an
area with table to identify it to which it belongs. The
number of messages exchanged in high ZHLS is what
influences the occupation of the bandwidth. Our
protocol attempts to reduce the number of messages.
Hence the network is zoned in HRP thereisnoneedof
periodic updates about the network’s source and the
bandwidth consumption and the number of reports
exchanged is highly reduced.
Operation of the Protocol HRP
HRP is a protocol that is based on the concept of
zones; each zone can contain multiple nodes
So we can define tree levels:
- Level node.
- Level Getaway.
- Level Cluster Head
Each node deploys a relocation method to find its
physical location and determines its zone ID by
mapping its physical location to the zone map.
Equipped with this zone ID, the node can start the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1952
intrazone (level of node) clustering and then the
interzone (level of getaway) clustering procedures to
build itsroutingtables.Eachasynchronouslybroadcast
a link request. Nodes within its communication range
in turn reply with link responses node ID, zone ID.
After all link responses are received, the node
generates its node LSP that contains the node ID of its
neighbors of the same zone and the zone ID of its
neighbors of different zones. Nodes may receive link
responses from the nodes of their neighboring zones.
After LSP receipt, cluster head communicates with the
getaway that is sending a scope on the tablecontaining
the nodes belongingtothearea.Theirgetawayschange
the tables receivedbytheclusterheadandupdatetheir
routing table.
3. ANALYSIS SNAPSHOT
Figure 3.1 Working Snap of NS2
Figure 3.2 Energy Consumption Comparison of
DSDV and HRP
In the Fig 3.2 Red strike shows DSDV output and green shows
HRP
In the Below Figure 3.3 Red strike shows AODV and green
shows DSR
Figure 3.3 AODV and DSR Comparison
Figure 3.4 AODV and Hybrid Comparison
In the above figure 3.4 Red strike shows AODV and
Green Strike Shows the Hybrid Protocol.This graph proves
that our Hybrid routing protocol is more energy efficient
than AODV.
4.CONCLUSION
Different Routing Protocols are applied in our
proposedCRNmodelandEnergyConsumptionXgraph
was generated for all the protocols.Based on X graph
result we Proves that AODV protocols Suits to the
network having highest number of nodes and DSR is
best for the network having less number of nodes and
for Hybrid protocol there is no need of periodic HELLO
messages. Hence for creating Energy Efficient model
Hybrid routing protocol plays an important role i.e,
Highly enrgy efficient which means it consumes very
less energy When compared with other protocols.
REFERENCES
[1] A Survey of spectrum sensing algorithms for
cognitive radio networks, T.Yucek and H. Arslan,
IEEE Commun Surveys, vol 11, 2009.
[2] Optimization Of CollaborativeSpectrumSensing,
A. Ghasemi and E.Sousa, J Commun, June 2007.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1953
[3] Catch me if you can: An abnormality detection
approach for CSS in Cognitive radio networks, H.Li
and Z.Han, IEEE Transaction, Wireless Commun,
Nov 2010.
[4] Cooperative Sensing among Cognitive Radios,
A.Sahai and S.Mishra, IEEE ICC, 2006.
[5] Optimal linear cooperation for spectrumsensing
in cognitive radio networks, Z.Quan and A.Sayed,
IEEE J.Sel.Topics, Vol no2, Feb 2008.
[6] On collaborative detection of TV transmission in
supportofdynamicspectrumsharing,E.Visotsky,S.
Kuffner and R.Peterson, IEEE DySPAN, 2005.
[7] Collaborative spectrum sensing with stranger:
Trust, or not to trust? , H.Li and Z. Han,IEEEWCNC,
2010.
[8] Attack-proof Collaborative spectrum sensing in
Cognitive Radio Network , H.Li ,Y.Sun and Z.Han,
IEEE CISS,2009
[9] Cooperative spectrum sensing with double
threshold detection basedonreputation,L.Duan,L.
Zhang, Y. Chu and S. Liu, IEEE WiCOM, 2009.
[10] Optimum number of secondary users in
collaborative spectrum sensing considering
resource efficiency, Y.Chen, IEEE Commun Letter,
Dec 2008.
[11] Yi Zheng, XianzhongXie, Lili Yang, “Cooperative
Spectrum Sensing Based on Blind Source
Separation for Cognitive Radio”,International
Conference on Future Information
Network(ICFIN),pp. 398-402, Oct 2009.
[12] Multitask Spectrum Sensing in Cognitive Radio
Networks via Spatiotemporal Data Mining Xin-
Huang, Gang Wang, and Fei Hu, IEEE
Transactions On Vehicular technology, Vol. 62,
No . 2, February 2013
[13] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty,
“NeXt Generation / dynamic spectrum
access/cognitive radio wireless Networks : a
survey”, Computer Networks, vol. 50, no. 13, pp.
2127–2159, 2006.

More Related Content

PDF
Zone Routing Protocol (ZRP)
PDF
Research Inventy : International Journal of Engineering and Science
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
PDF
A41040105
PDF
Energy Efficient Multipath Routing Protocol For MANET
PDF
O26087092
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
PPTX
Routing protocols for ad hoc wireless networks
Zone Routing Protocol (ZRP)
Research Inventy : International Journal of Engineering and Science
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
A41040105
Energy Efficient Multipath Routing Protocol For MANET
O26087092
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
Routing protocols for ad hoc wireless networks

What's hot (17)

PDF
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
PPTX
MANET Routing Protocols , a case study
PDF
Routing protocols in ad hoc network
PDF
A simulation based performance evaluation
PPTX
proactive and reactive routing comparisons
PPTX
Simulation & comparison of aodv & dsr protocol
PDF
IRJET- Optimum Routing Algorithm for MANET
PPT
Routing in Manet
PPT
Wireless routing protocols
PDF
Md3421762181
PPT
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
PDF
Progressive Routing Protocol using Hybrid Analysis for MANETs
PDF
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
PPT
Routing ad hoc network
PDF
Design and development of load sharing multipath routing protcol for mobile a...
PDF
Az26337342
PPTX
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
MANET Routing Protocols , a case study
Routing protocols in ad hoc network
A simulation based performance evaluation
proactive and reactive routing comparisons
Simulation & comparison of aodv & dsr protocol
IRJET- Optimum Routing Algorithm for MANET
Routing in Manet
Wireless routing protocols
Md3421762181
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
Progressive Routing Protocol using Hybrid Analysis for MANETs
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Routing ad hoc network
Design and development of load sharing multipath routing protcol for mobile a...
Az26337342
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
Ad

Similar to Network Surveillance Based Data Transference in Cognitive Radio Network with the Comparison of Different Routing Protocols (20)

PDF
IRJET- Survey on Enhancement of Manet Routing Protocol
PDF
Performance evaluation of two models in the reactive routing protocol in manets
PDF
Performance analysis on multihop transmission using arp routing protocol in i...
PDF
Performance analysis on multihop transmission using
PDF
Bh4103368374
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PDF
Improved routing scheme with ACO in WSN in comparison to DSDV
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
PDF
To improve the QoS in MANETs through analysis between reactive and proactive ...
PDF
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
PDF
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
PDF
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
PDF
SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC N...
PDF
Progressive Routing Protocol using Hybrid Analysis for MANETs
PDF
Source routing in Mobile Ad hoc NETworks (MANETs)
DOC
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
PDF
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IRJET- Survey on Enhancement of Manet Routing Protocol
Performance evaluation of two models in the reactive routing protocol in manets
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using
Bh4103368374
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
Improved routing scheme with ACO in WSN in comparison to DSDV
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
To improve the QoS in MANETs through analysis between reactive and proactive ...
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC N...
Progressive Routing Protocol using Hybrid Analysis for MANETs
Source routing in Mobile Ad hoc NETworks (MANETs)
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
OOP with Java - Java Introduction (Basics)
PDF
composite construction of structures.pdf
PPTX
Welding lecture in detail for understanding
PPTX
Construction Project Organization Group 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Project quality management in manufacturing
PDF
PPT on Performance Review to get promotions
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
OOP with Java - Java Introduction (Basics)
composite construction of structures.pdf
Welding lecture in detail for understanding
Construction Project Organization Group 2.pptx
Internet of Things (IOT) - A guide to understanding
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Project quality management in manufacturing
PPT on Performance Review to get promotions
UNIT-1 - COAL BASED THERMAL POWER PLANTS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

Network Surveillance Based Data Transference in Cognitive Radio Network with the Comparison of Different Routing Protocols

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1949 NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING PROTOCOLS G.ELANAGAI1 C.JAYASRI2 1PG Scholar, Dept. of ECE 2Assistant Professor, Dept. of ECE AVC College of Engineering , Mannampandal, Mayiladuthurai. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Creation of Energy-Efficient Cognitive Radio model is a challenging task. There are many traditional methods which are highly energy efficient, but it does not bother about network security. Hence in this paper we are comparing different wireless routing protocols and find best protocol to create energy efficient Cognitive Radio network (CRN) model having attacker nodes in it. Finally energy consumption comparison graph was generatedbetweenthose routing protocols and finds the efficient model i.e. thecreation of energy efficient CRN model. Key Words: Network Security,Energy Efficiency,Cognitive radio (CR), X Graph 1. INTRODUCTION Cognitive radio is a Software-defined radio that can able to access unused radio spectrum holes efficiently. The definition adopted by Federal CommunicationsCommission (FCC):“Cognitive radio: A radio or system that senses its operational electromagnetic environment and can dynamically and autonomously adjust its radio operating parameters to modify system operation, such as maximize throughput, mitigate interference, facilitateinteroperability, access secondary markets.” Cognitive radio (CR) techniques provide the capability of detecting spectrum holes and sharing the spectrum in an opportunistic manner. DSA techniques can select the best available channel from the spectrum pool for CR devices to operate [4]. More specifically, CR enables secondary users (SUs) to perform a series of operations as follows: 1) spectrum sensing to predict what spectrum is available and recognize the presence of the primary user (PU) when a PU reoccupiesthe licensed channel; 2) spectrummanagementtoselectthe best available channel from the spectrum pool for special services; 3) spectrum sharing to coordinate access to all available channels with other SUs; and 4) spectrummobility to vacate the channel as soon as possible when a PU is detected [4]. Spectrum sensing is one of the most important components in the cognition cycle .Routing protocols plays an important role to choose an efficientCRN model.Hence in this paper we are going to compare the reactive, Proactive and Hybrid routing Protocols. The below figure 1.1 shows the basic cognition cycle [13]. 2. WIRELESS ROUTING PROTOCOLS Figure 2.1 Routing Protocols Classification Wireless Routing protocols Eg: AODV, DSR Reactive Proactive Hybrid Eg: DSDV, OLSR
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1950  Reactive (AODV,DSR,TORA) on demand  Proactive (DSDV,OLSR,WRP) table driven  Hybrid (ZRP) combination of reactive and proactive. In this paper we are going to compare three routing protocols to choose the best one. 2.1 Reactive Protocol Reactive Protocol has lower overhead since routes are determined on demand. It employs flooding (global search) concept. Constantly updatingofroutetables with the latest route topology is not required in on demand concept. Reactive protocol searches for the route in an on-demand manner and set the link in order to send out and accept the packet from a source node to destination node. Route discovery process is used in on demand routing by flooding the route request (RREQ) packets throughout the network. Examples of reactive routing protocols are the dynamic source Routing (DSR), ad hoc on-demand distance vector routing (AODV). 2.1.1 AODV Adhoc-Ondemand–Distance-Vectoristhealgorithm used here it enables dynamic, multihop routing betweenthe nodes.It allows the nodes to obtain the routes quickly and the operation is loop-free one and it has setup of reverse/forward pointers. The major advantage of this algorithm is it avoids link breakage, AODV causes affected set of nodes to be notified, so we can invalidate the route using lost link. Route Request (RREQ’s), Route Replies (RREP’s) and Route Errors (REER’s) are the message types defined by AODV algorithm. Advantages of AODV Highly suitable for more number of nodes.Use of periodic indication messages to track neighbours the messages supporting the routes maintenance are range- limited, so they do not cause unnecessary overhead in the network. The connection setup delay is less. RERR (Route error) is defined so we can avoid link breakage. 2.1.2 DSR DSR uses source routing concept. When packets are flooded by a source node, the sender node caches complete hop-by-hop routetothereceivernode.These route lists are caches in a route cache. The datapackets carry the source route in the packet header. DSR uses Route Discovery process to send the data packetsfrom sender to receiver node for which it does not already know the route; it uses a route discovery process to dynamically determine such a route. In Route discovery DSR works by flooding the data packets in network with route request (RREQ) packets. RREQ packets are received by every neighbor nodes and continue this flooding process by retransmissions of RREQ packets, unless it gets destination or its route cache consists a route for destination .Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to real source node .source routing uses RREQ and RREP packets. The RREQ builds up the path traversed across the network. The RREP routes itself back to the source by traversing this path toward the back. The source caches backward route by RREP packets for upcoming use. If any connection on a source route is wrecked, a route error (RERR)packetis notified to the source node. 2.2 Proactive Protocol Each node in the network has routing table for the broadcast of the data packets and want toestablish connection to other nodes in the network.Thesenodes record for all the presented destinations, number of hops required to arrive at each destination in the routing table. The routing entry is tagged with a sequence number which is created by the destination node. To retain the stability, each station broadcasts and modifies its routing table from time to time. How many hops are required to arrive that particular node and which stations are accessible is result of broadcasting ofpacketsbetweennodes.Eachnodethat broadcasts data will contain its new sequencenumber. The proactive protocols are appropriate for less number of nodes in networks, as they need to update node entries for each and every node in the routing table of every node. It results more Routing overhead problem. There is consumption of more bandwidth in routing table. Example of Proactive RoutingProtocol is Destination Sequenced Distance Vector (DSDV).
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1951 2.2.1 DSDV The DSDV routing protocol is an enhanced version of the distributed Bellman-Ford algorithm where each node maintain a table that contain the shortest distance and the first node on the shortest path to every other node in the network. Each node, upon receiving an update, quickly disseminatesittoits neighbors in order to propagate the broken-link information to the whole network. Thus a single link break leads to the propagation of table update information to the whole network. Advantage It can be applied to MANETs with few modifications. The updatesarepropagatedthroughout the network in order to maintain an up-to-date viewof the network topology at all the nodes. Disadvantages (1) The DSDV suffers from excessive control overhead that is proportional to the number of nodes in the network and therefore is not scalable in MANETs, which have limited bandwidth and whose topologies are highly dynamic. (2) In order to obtain information about a particular destination node, a node has to wait for a table update message initiatedbythesamedestination node. This delay could result in stale routing information at nodes. 2.2.2 OLSR Optimized Link State Protocol (OLSR) is a proactive routing protocol, so the routes are always immediately available when needed. OLSR is an optimization version of a pure link state protocol. So the topological changes cause the flooding of the topological information to all available hosts in the network. To reduce the possible overhead in the network protocol uses Multipoint Relays (MPR). The idea of MPR is to reduce flooding of broadcasts by reducing the same broadcast in some regions in the network, more details about MPR can be found later in this chapter. Another reduce is to provide the shortest path. The reducing the time interval for the control messages transmissioncanbringmorereactivitytothe topological changes. Advantages OLSR is also a flat routing protocol; it does not need central administrative system to handle its routing process. The proactive characteristic of the protocol provides that the protocol has all the routing information to all participated hosts in the network. However, as adrawbackOLSRprotocolneedsthateach host periodic sends the updated topology information throughout the entire network, this increase the protocols bandwidth usage. But the flooding is minimized by the MPRs, which are only allowed to forward the topological messages. 2.2.3 Hybrid Routing Protocol (HRP) HRP is a hybrid protocol that separates the network into several zones, which makes a hierarchical protocol as the protocol ZHLS (zone- based hierarchical link state). HRP is based on GPS (Global positioning system), which allows each node to identify its physical position before mapping an area with table to identify it to which it belongs. The number of messages exchanged in high ZHLS is what influences the occupation of the bandwidth. Our protocol attempts to reduce the number of messages. Hence the network is zoned in HRP thereisnoneedof periodic updates about the network’s source and the bandwidth consumption and the number of reports exchanged is highly reduced. Operation of the Protocol HRP HRP is a protocol that is based on the concept of zones; each zone can contain multiple nodes So we can define tree levels: - Level node. - Level Getaway. - Level Cluster Head Each node deploys a relocation method to find its physical location and determines its zone ID by mapping its physical location to the zone map. Equipped with this zone ID, the node can start the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1952 intrazone (level of node) clustering and then the interzone (level of getaway) clustering procedures to build itsroutingtables.Eachasynchronouslybroadcast a link request. Nodes within its communication range in turn reply with link responses node ID, zone ID. After all link responses are received, the node generates its node LSP that contains the node ID of its neighbors of the same zone and the zone ID of its neighbors of different zones. Nodes may receive link responses from the nodes of their neighboring zones. After LSP receipt, cluster head communicates with the getaway that is sending a scope on the tablecontaining the nodes belongingtothearea.Theirgetawayschange the tables receivedbytheclusterheadandupdatetheir routing table. 3. ANALYSIS SNAPSHOT Figure 3.1 Working Snap of NS2 Figure 3.2 Energy Consumption Comparison of DSDV and HRP In the Fig 3.2 Red strike shows DSDV output and green shows HRP In the Below Figure 3.3 Red strike shows AODV and green shows DSR Figure 3.3 AODV and DSR Comparison Figure 3.4 AODV and Hybrid Comparison In the above figure 3.4 Red strike shows AODV and Green Strike Shows the Hybrid Protocol.This graph proves that our Hybrid routing protocol is more energy efficient than AODV. 4.CONCLUSION Different Routing Protocols are applied in our proposedCRNmodelandEnergyConsumptionXgraph was generated for all the protocols.Based on X graph result we Proves that AODV protocols Suits to the network having highest number of nodes and DSR is best for the network having less number of nodes and for Hybrid protocol there is no need of periodic HELLO messages. Hence for creating Energy Efficient model Hybrid routing protocol plays an important role i.e, Highly enrgy efficient which means it consumes very less energy When compared with other protocols. REFERENCES [1] A Survey of spectrum sensing algorithms for cognitive radio networks, T.Yucek and H. Arslan, IEEE Commun Surveys, vol 11, 2009. [2] Optimization Of CollaborativeSpectrumSensing, A. Ghasemi and E.Sousa, J Commun, June 2007.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1953 [3] Catch me if you can: An abnormality detection approach for CSS in Cognitive radio networks, H.Li and Z.Han, IEEE Transaction, Wireless Commun, Nov 2010. [4] Cooperative Sensing among Cognitive Radios, A.Sahai and S.Mishra, IEEE ICC, 2006. [5] Optimal linear cooperation for spectrumsensing in cognitive radio networks, Z.Quan and A.Sayed, IEEE J.Sel.Topics, Vol no2, Feb 2008. [6] On collaborative detection of TV transmission in supportofdynamicspectrumsharing,E.Visotsky,S. Kuffner and R.Peterson, IEEE DySPAN, 2005. [7] Collaborative spectrum sensing with stranger: Trust, or not to trust? , H.Li and Z. Han,IEEEWCNC, 2010. [8] Attack-proof Collaborative spectrum sensing in Cognitive Radio Network , H.Li ,Y.Sun and Z.Han, IEEE CISS,2009 [9] Cooperative spectrum sensing with double threshold detection basedonreputation,L.Duan,L. Zhang, Y. Chu and S. Liu, IEEE WiCOM, 2009. [10] Optimum number of secondary users in collaborative spectrum sensing considering resource efficiency, Y.Chen, IEEE Commun Letter, Dec 2008. [11] Yi Zheng, XianzhongXie, Lili Yang, “Cooperative Spectrum Sensing Based on Blind Source Separation for Cognitive Radio”,International Conference on Future Information Network(ICFIN),pp. 398-402, Oct 2009. [12] Multitask Spectrum Sensing in Cognitive Radio Networks via Spatiotemporal Data Mining Xin- Huang, Gang Wang, and Fei Hu, IEEE Transactions On Vehicular technology, Vol. 62, No . 2, February 2013 [13] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, “NeXt Generation / dynamic spectrum access/cognitive radio wireless Networks : a survey”, Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.