SlideShare a Scribd company logo
1 of 5
Download to read offline
80 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
Cut Detection in Wireless Sensor
Network
Prof.Vrushali Kondhalkar1
| Tambe Bhagyashri2
| Temkar Gaurav3
| Thorawat Prafull4
1Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
2Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
3Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
4Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
Wireless sensor network can get separated into multiple connected components due to the failure of some
of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining
nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the
connectivity to a specially designated node has been lost, and 2) one or more nodes (that are connected to the
special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous:
every node needs to communicate with only those nodes that are within its communication range. The
algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The
convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
KEYWORDS: CUT DETECTION,NETWORK SEPERATION,SENSOR NETWORK,ITERATIVE COMPUTATION.
Copyright © 2015 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Wireless sensor networks (WSNs) are a promising
technology for monitoring large regions at high
spatial and temporal resolution. However, the
small size and low cost of the nodes that makes
them attractive for wide spread deployment also
causes the disadvantage of low-operational
reliability. A node may fail due to various factors
such as mechanical/electrical problems,
environmental degradation, battery depletion, or
hostile tampering. In fact, node failure is expected
to be quite common due to the typically limited
energy budget of the nodes that are powered by
small batteries. Failure of a set of nodes will reduce
the number of multi-hop paths in the network.
Such failures can cause a subset of nodes—that
have not failed—to become disconnected from the
rest, resulting in a ―cut.‖ Two nodes are said to be
disconnected if there is no path between them[1].
In this paper, we propose a distributed algorithm
to detect cuts , named the Distributed Cut
Detection (DCD)algorithm. The algorithm allows
each node to detect DOS events and a subset of
nodes to detect CCOS events. The algorithm we
propose is distributed and asynchronous: it
involves only local communication between
neighboring nodes, and is robust to temporary
communication failure between node pairs. A key
component of the DCD algorithm is a distributed
iterative computational step through which the
nodes compute their (fictitious) electrical
potentials. The convergence rate of the
computation is independent of the size and
structure of the network[2].The DOS detection part
of the algorithm is applicable to arbitrary networks;
a node only needs to communicate a scalar variable
to its neighbors. The CCOS detection part of the
algorithm is limited to networks that are deployed
in 2D euclidean spaces, and nodes need to know
their own positions. The position information need
not be highly accurate. The proposed algorithm is
an extension of partially examined the DOS
detection problem [3].
II. DISTRIBUTION CUT DETECTION
The algorithm we propose is asynchronous and
distributed: it involves communication between
ABSTRACT
81 International Journal for Modern Trends in Science and Technology
Cut Detection in Wireless Sensor Network
neighboring nodes, and is robust to temporary
communication failure between node pairs. A key
component of the DCD algorithm is a distributed
iterative computational step through which the
nodes from sensor network compute their electrical
potentials.[2]
A. Cut
Wireless sensor networks (WSNs) are a promising
technology for monitoring large regions at high
spatial and temporal resolution. In fact, node
failure is expected to be quite common due to the
typically limited energy budget of the nodes.
Failure of a set of nodes will reduce the number of
multi-hop paths in the network. Such failures can
cause a subset of nodes – that have not failed – to
become disconnected from the rest, resulting in a
―cut‖. Two nodes are said to be disconnected if
there is no path between them.[1]
B. Source node
We consider the problem of detecting cuts by the
nodes of a wireless sensor network. We assume
that there is a specially designated node in the
network, which we call the source node. The source
node may be a base
station that serves as an interface between the
network and its users. Since a cut may or may not
separate a node from the source node, we
distinguish between two distinct outcomes of a cut
for a particular node [1]
C. CCOS and DOS
When a node u is disconnected from the source,
we say that a DOS (Disconnected frOm Source)
event has occurred for u. When a cut occurs in the
network that does not separate a node u from the
source node, we say that CCOS (Connected, but a
Cut Occurred Somewhere) event has occurred for
u. By cut detection we mean (i) detection by each
node of a DOS event when it occurs, and (ii)
detection of CCOS events by the nodes close to a
cut, and the approximate location of the cut.[1]
III. DCD ALGORITHM
Comes with provable characterization on the DOS
detection accuracy CCOS events detection can be
identified
DCD algorithm enables base station and also every
node to detect if it is disconnected from the base
station.
A. DOS DETECTION
As the name of algorithm says its Disconnected
from source. To send packets we use Shortest path
algorithm, it is based on energy that means at the
time of sending packets from source sensors node
to destination sensor node, due to throughput or
any energy related issue packets are not reaching
to destination. And that disturbance is from near to
source sensor node [3]. To resolve this problem we
use the alternative shortest path. After repairing
the cut, packets are transferred from earlier path.
Diagram 1(a) shows cut occurred near to the
source sensor node. Due to this it find some
another alternative path to transferred a packets to
destination sensor node. Diagram 1(b) shows
alternative shortest path [2].
1(a)
1(b)
B. CCOS Detection
As the name of algorithm says it’s Connected but
Cut Occurred From Source. At the time of sanding
packets cut is occurred somewhere middle in the
path. To resolve this problem it uses alternative
shortest path. Cut occurred in respective node, i.e.
node not having sufficient energy to pass the
packets forward. diagram 2(a) shows cut occurred
in between the path[1]. To resolve this , it does the
same thing as done in DOS.
2(a)
82 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
2(b)
IV. RESULTS
Status of Different Communicating Nodes:
Cut Detection Network Monitor:
83 International Journal for Modern Trends in Science and Technology
Cut Detection in Wireless Sensor Network
V. CONCLUSION
We conclude that, The DCD algorithm we
propose here enables every node of a wireless
sensor network to detect disconnected from source
event if they occur. Second, it enables the subset of
nodes that experiences CCOS event to detect them
and estimate the approximate location of the cut in
the form of a list of active nodes that lie at
theboundary of the cut/hole. A key strength of the
DCD algorithm is that the convergence rate of the
underlying iterative scheme is quite fast and
independent of the size and structure of the
network, which makes detection using this
algorithm quite fast[5].
REFERENCES
[1] G. Dini, M. Pelagatti, and I.M. Savino, ―An
Algorithm for Reconnecting Wireless Sensor
Network Partitions,‖ Proc. European Conf. Wireless
Sensor Networks, pp. 253-267, 2008.
[2] N. Shrivastava, S. Suri, and C.D. To´ th, ―Detecting
Cuts in Sensor Networks,‖ ACM Trans. Sensor
Networks, vol. 4, no. 2, pp. 1-25, 2008.
[3] H. Ritter, R. Winter, and J. Schiller, ―A Partition
Detection System for Mobile Ad-hoc Networks,‖ Proc.
First Ann. IEEE Comm. Soc. Conf. Sensor and Ad
Hoc Comm. And Networks (IEEE SECON ’04), pp.
489-497, Oct. 2004.
[4] M. Hauspie, J. Carle, and D. Simplot, ―Partition
Detection in Mobile Ad-Hoc Networks,‖ Proc. Second
Mediterranean Workshop Ad-Hoc Networks, pp.
25-27, 2003.
84 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
[5] P. Barooah, ―Distributed Cut Detection in Sensor
Networks,‖ Proc. 47th IEEE Conf. Decision and
Control, pp. 1097-1102, Dec.2008.
[6] A.D. Wood, J.A. Stankovic, and S.H. Son, ―Jam: A
Jammed-Area Mapping Service for Sensor
Networks,‖ Proc. IEEE Real Time Systems Symp.,
2003.

More Related Content

What's hot

Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksambitlick
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 

What's hot (19)

Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networks
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Br33421423
Br33421423Br33421423
Br33421423
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 

Viewers also liked

Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...IJMTST Journal
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...IJMTST Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...IJMTST Journal
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...IJMTST Journal
 
Correlation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsCorrelation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsIJMTST Journal
 
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...IJMTST Journal
 
Garden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsGarden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsIJMTST Journal
 
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorAnalysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorIJMTST Journal
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...IJMTST Journal
 
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...IJMTST Journal
 
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsAn Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsIJMTST Journal
 
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersA New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersIJMTST Journal
 
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryShadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryIJMTST Journal
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
 
ANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementIJMTST Journal
 
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationVehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationIJMTST Journal
 
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...IJMTST Journal
 
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterGrid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterIJMTST Journal
 

Viewers also liked (19)

Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
 
Correlation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsCorrelation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram Signals
 
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
 
Garden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsGarden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using Sensors
 
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorAnalysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
 
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
 
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsAn Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
 
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersA New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
 
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryShadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
ANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality Improvement
 
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationVehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
 
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
 
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterGrid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
 

Similar to Detecting Cuts in Wireless Sensor Networks

18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septianIAESIJEECS
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Editor IJARCET
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Editor IJARCET
 
Cv31424430
Cv31424430Cv31424430
Cv31424430IJMER
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
F04503057062
F04503057062F04503057062
F04503057062ijceronline
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...csandit
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...cscpconf
 

Similar to Detecting Cuts in Wireless Sensor Networks (20)

18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
 
Cut detection
Cut detectionCut detection
Cut detection
 
Cut detection
Cut detectionCut detection
Cut detection
 
Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
F04503057062
F04503057062F04503057062
F04503057062
 
K010526570
K010526570K010526570
K010526570
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Detecting Cuts in Wireless Sensor Networks

  • 1. 80 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST Cut Detection in Wireless Sensor Network Prof.Vrushali Kondhalkar1 | Tambe Bhagyashri2 | Temkar Gaurav3 | Thorawat Prafull4 1Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. 2Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. 3Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. 4Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. KEYWORDS: CUT DETECTION,NETWORK SEPERATION,SENSOR NETWORK,ITERATIVE COMPUTATION. Copyright © 2015 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. However, the small size and low cost of the nodes that makes them attractive for wide spread deployment also causes the disadvantage of low-operational reliability. A node may fail due to various factors such as mechanical/electrical problems, environmental degradation, battery depletion, or hostile tampering. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes—that have not failed—to become disconnected from the rest, resulting in a ―cut.‖ Two nodes are said to be disconnected if there is no path between them[1]. In this paper, we propose a distributed algorithm to detect cuts , named the Distributed Cut Detection (DCD)algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their (fictitious) electrical potentials. The convergence rate of the computation is independent of the size and structure of the network[2].The DOS detection part of the algorithm is applicable to arbitrary networks; a node only needs to communicate a scalar variable to its neighbors. The CCOS detection part of the algorithm is limited to networks that are deployed in 2D euclidean spaces, and nodes need to know their own positions. The position information need not be highly accurate. The proposed algorithm is an extension of partially examined the DOS detection problem [3]. II. DISTRIBUTION CUT DETECTION The algorithm we propose is asynchronous and distributed: it involves communication between ABSTRACT
  • 2. 81 International Journal for Modern Trends in Science and Technology Cut Detection in Wireless Sensor Network neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes from sensor network compute their electrical potentials.[2] A. Cut Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them.[1] B. Source node We consider the problem of detecting cuts by the nodes of a wireless sensor network. We assume that there is a specially designated node in the network, which we call the source node. The source node may be a base station that serves as an interface between the network and its users. Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node [1] C. CCOS and DOS When a node u is disconnected from the source, we say that a DOS (Disconnected frOm Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean (i) detection by each node of a DOS event when it occurs, and (ii) detection of CCOS events by the nodes close to a cut, and the approximate location of the cut.[1] III. DCD ALGORITHM Comes with provable characterization on the DOS detection accuracy CCOS events detection can be identified DCD algorithm enables base station and also every node to detect if it is disconnected from the base station. A. DOS DETECTION As the name of algorithm says its Disconnected from source. To send packets we use Shortest path algorithm, it is based on energy that means at the time of sending packets from source sensors node to destination sensor node, due to throughput or any energy related issue packets are not reaching to destination. And that disturbance is from near to source sensor node [3]. To resolve this problem we use the alternative shortest path. After repairing the cut, packets are transferred from earlier path. Diagram 1(a) shows cut occurred near to the source sensor node. Due to this it find some another alternative path to transferred a packets to destination sensor node. Diagram 1(b) shows alternative shortest path [2]. 1(a) 1(b) B. CCOS Detection As the name of algorithm says it’s Connected but Cut Occurred From Source. At the time of sanding packets cut is occurred somewhere middle in the path. To resolve this problem it uses alternative shortest path. Cut occurred in respective node, i.e. node not having sufficient energy to pass the packets forward. diagram 2(a) shows cut occurred in between the path[1]. To resolve this , it does the same thing as done in DOS. 2(a)
  • 3. 82 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST 2(b) IV. RESULTS Status of Different Communicating Nodes: Cut Detection Network Monitor:
  • 4. 83 International Journal for Modern Trends in Science and Technology Cut Detection in Wireless Sensor Network V. CONCLUSION We conclude that, The DCD algorithm we propose here enables every node of a wireless sensor network to detect disconnected from source event if they occur. Second, it enables the subset of nodes that experiences CCOS event to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at theboundary of the cut/hole. A key strength of the DCD algorithm is that the convergence rate of the underlying iterative scheme is quite fast and independent of the size and structure of the network, which makes detection using this algorithm quite fast[5]. REFERENCES [1] G. Dini, M. Pelagatti, and I.M. Savino, ―An Algorithm for Reconnecting Wireless Sensor Network Partitions,‖ Proc. European Conf. Wireless Sensor Networks, pp. 253-267, 2008. [2] N. Shrivastava, S. Suri, and C.D. To´ th, ―Detecting Cuts in Sensor Networks,‖ ACM Trans. Sensor Networks, vol. 4, no. 2, pp. 1-25, 2008. [3] H. Ritter, R. Winter, and J. Schiller, ―A Partition Detection System for Mobile Ad-hoc Networks,‖ Proc. First Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. And Networks (IEEE SECON ’04), pp. 489-497, Oct. 2004. [4] M. Hauspie, J. Carle, and D. Simplot, ―Partition Detection in Mobile Ad-Hoc Networks,‖ Proc. Second Mediterranean Workshop Ad-Hoc Networks, pp. 25-27, 2003.
  • 5. 84 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST [5] P. Barooah, ―Distributed Cut Detection in Sensor Networks,‖ Proc. 47th IEEE Conf. Decision and Control, pp. 1097-1102, Dec.2008. [6] A.D. Wood, J.A. Stankovic, and S.H. Son, ―Jam: A Jammed-Area Mapping Service for Sensor Networks,‖ Proc. IEEE Real Time Systems Symp., 2003.