Abstract

One common feature of almost all wireless protocols is the address structure for source and destination nodes within the wireless network. The paper aims at demonstrate and establish a multi-node Cluster-Head sensor Ad Hoc network, enable secure transfers on data on that network using encryption algorithm, propose a simple Ad Hoc protocol for joining and transferring data to a Cluster-Head facilitator, collect temperature, battery voltage, and signal strength as part of the packet, and present data collected using GUI/web-based system. In this paper, a low-level RF interface to establish clear channel, and cluster loin and link is proposed, query and response for remote node sensor data are implemented, both raw and encrypted data packets using a common encryption algorithm are tested and, the network is monitored at the Cluster-Head attached to the PC and the network activity is posted on-line. The proposed structure is purely independent on the physical and network layers of the RF protocols. The data is received if the preamble and CRC show valid on receipt of an RF packet, the resulting 64 bytes is decrypted and transferred to the network layer where the port, type, address is evaluated. All of the interface and processing is implemented on the network layer, the physical interface has cleared the FIFO and prepared the device for additional receipt or response transmission depending on the packet type. The impact of the cognitive addressing is not felt until the network passes the packet up to the application layer. The network layer will determine if the incoming request or message is for this node and then passes the structure up to the application with the received data and type of packet determined by the port number. The cognitive addressing byte simply allowed the packet to be accepted if it has no bearing on the type of request or application it manipulates. As the cognitive data is passed as part of the address for the node, as matching the node address is required for response. The real purpose of the proposed method is to reduce network traffic by identifying general capabilities, in the simple join request and cut down on broadcast response requests by including only certain node need be concerned with the broadcast message.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.