Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 4, Issue 2, 2017, Page No: 1-8
doi:dx.doi.org/10.20431/2349-4859.0402001

Preventive Measures from Virus Attack for Energy Optimization in Wireless Sensor Network

Krishan kumar1,Ms.Shruti Goyal2

1.M.Tech Scholar, Computer Science and Engineering Department, OM Institute of technology and Management, Juglan , India
2.Assistant Professor, Computer Science and Engineering Department, OM Institute of technology and Management, Juglan. India

Citation :Krishan kumar,Ms.Shruti Goyal, Preventive Measures from Virus Attack for Energy Optimization in Wireless Sensor Network International Journal of Research Studies in Computer Science and Engineering 2017,4(2) : 1-8

Abstract

This paper focuses on mathematical model based on epidemic theory to consider the lifetime of nodes in the propagation of virus in a wireless sensor network. The monitoring of environment can be done by a spatial nodes distributed in monitored field. Due to limited capability of computation, sensing and communication, nodes are less secured. So, infections of nodes are higher. Due to limited power of nodes, running virus can reduce the power of nodes unexpectedly. Existing models such as SIS (Susceptible Infected Susceptible), SIR (Susceptible Infected Recovered), SEIR (Susceptible Exposed Infective Recovered) do not consider the power consumption of nodes in their models. In this paper SEIR model is modified to use dead nodes properties. It considers the communication protocols to flow the information in the networks. Virus is propagated with the help of neighboring nodes. WSNs can use the model on the basis of their positions, continuous sensing, event detection, location sensing etc. Mathematical model analysis is done to study the effect of dead nodes. Proposed model is useful to prevent the virus attack and helpful for capture the good behavior of propagation in networks.


Download Full paper: Click Here