Evaluation and implementation of cluster head selection in WSN using Contiki/Cooja simulator

被引:11
|
作者
Sharad [1 ]
Kaur, Er. Navpreet [1 ,2 ]
Aulakh, Inderdeep Kaur [3 ]
机构
[1] Chandigarh Univ, Dept Comp Sci & Engn, Chandigarh 160036, India
[2] Panjab Univ, Chandigarh, India
[3] Panjab Univ, Univ Inst Engn & Technol, Dept Informat Technol, Chandigarh 160014, India
来源
关键词
Wireless Sensor Networks; Cooja; POWER;
D O I
10.1080/09720510.2020.1736324
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
Remote Sensor Systems are these days turning into a normal segment in our everyday life for simplicity of numerous tasks. It is already seen that they are currently conveyed in almost every field of wireless sensor network research. Numerous territories in research and innovation are adjusting to utilize remote sensor systems for investigation of information. Contiki is another working framework when contrasted with a large portion of the other working frameworks in this field. Because of the utilization of C language for its improvement, many progressed and light segments are currently winding up some portion of it. Despite the fact that the speed of improvement in Contiki is fast and exceptional, however regardless it does not have the utilization of security natives for secure correspondence between sensor hubs. Right, now there is just a single Security engineering "ContikiSec" proposed for this working framework. Cooja is a test system given by Contiki, which not like most test systems additionally, enables genuine equipment stages to be imitated. In this instructional exercise you will figure out how to utilize the Cooja Simulator to arrange an essential RPL network.
引用
收藏
页码:407 / 418
页数:12
相关论文
共 50 条
  • [1] Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator
    Khoury, David
    Haddad, Samir
    Sondi, Patrick
    Abou Haidar, Gaby
    Semaan, David
    Sayah, Jinane
    IEEE ACCESS, 2024, 12 : 122350 - 122362
  • [2] Performance Analysis of Constrained Application Protocol Using Cooja Simulator in Contiki OS
    Naik, Kanchana P.
    Joshi, Rakesh U.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 547 - 550
  • [3] Comparative study of localization methods in WSN using Cooja simulator
    Laaouafy, Mostapha
    Lakrami, Fatima
    Labouidya, Ouidad
    Elkamoun, Najib
    Iqdour, Redouane
    2019 7TH MEDITERRANEAN CONGRESS OF TELECOMMUNICATIONS (CMT 2019), 2019,
  • [4] Dynamic Cluster Head Selection in WSN
    Hada, Rupendra Pratap Singh
    Srivastava, Abhishek
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (04)
  • [5] Analysis of Cluster Head Selection Methods In WSN
    Arulmurugan, A.
    Waris, Saiyed Faiayaz
    Bhagyalakshmi, N.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 114 - 119
  • [6] A NOVEL APPROACH FOR CLUSTER HEAD SELECTION USING TRUST FUNCTION IN WSN
    Narayan, Vipul
    Daniel, A. K.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2021, 22 (01): : 1 - 12
  • [7] Evaluation Study of Secondary Cluster Head Selection using Fuzzy Logic in WSN for Conservation of Battery Energy
    Ranjith, Rinu Sara
    Vishwas, H. N.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 50 - 55
  • [8] Implementation of survivability aware protocols in WSN for IoT applications using Contiki-OS and hardware testbed evaluation
    Elappila, Manu
    Chinara, Suchismita
    MICROPROCESSORS AND MICROSYSTEMS, 2024, 104
  • [9] Optimization of Routing and Cluster Head Selection in WSN: A Survey
    Fakhri, Israa Sabri
    Marhoon, Haydar Abdulameer
    Hussein, Mohsin Hasan
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 2, FONES-AIOT 2024, 2024, 1036 : 409 - 422
  • [10] Cluster head selection by randomness with data recovery in WSN
    Devesh Pratap Singh
    R. H. Goudar
    Bhasker Pant
    Sreenivasa Rao
    CSI Transactions on ICT, 2014, 2 (2) : 97 - 107