In this paper, we propose an survey on heterogeneous wireless sensor network (HWSN) and the efficiency and redundancy management is exploit in the various methods .Here timeliness and security are main concern to maximize the system lifetime by ensuring various methods like Intrusion detection system (ids), multipath routing, etc, The main goal of the paper is to reveal various methods which are used to maintain best redundancy level and increasing the energy efficiency. I. Introduction: Wireless sensors networks (WSN) are planned in unattended surroundings in which energy replacement is difficult if not possible. Due to partial income, a WSN should not only assure the application specific QoS requirements such as timeliness, security, and reliability, but also reduce energy consumption to extend the system helpful lifetime. The WSN aim is maximize the system lifetime exchange between the energy consumption vs. reliability. However, no previous work exists to consider the exchange in the presence of malicious attackers. It is commonly believed in the explore neighborhood that cluster is an effective solution for reach scalability, energy conservation, and reliability. If homogeneous nodes which rotate among themselves in the roles of cluster heads (CHs) and sensor nodes (SNs) leveraging CH election protocols such as HEED (10) for lifetime maximization has been consider. Demonstrated that using heterogeneous nodes can further improve performance and extend the system lifetime. In the last case, nodes with greater resources provide as CHs performing computation all intensive tasks while inexpensive less capable SNs are utilized mainly for sensing the environment. The tradeoff issue between energy consumption vs. QoS increase becomes much more difficult when inside attackers are present as a path may be broken when a malicious node in the path. The case in heterogeneous Wireless Sensor Network (HWSN) environments in which CH nodes may take a more critical role in gathering and routing intellect data. The system would occupy an intrusion detection system (IDS) with the purpose to detect and remove the malicious node. While the literature is plentiful in intrusion detection techniques for WSNs (3), the issue of often intrusion detection should be invoked for energy reasons in order to remove potentially malicious nodes so that the system lifetime is maximized are largely unfamiliar. The issue is particularly dangerous for energy constrained WSNs designed to stay alive for a long mission time. The multipath routing is regard as an efficient mechanism designed for fault and intrusion tolerance to get better data release in WSNs. The basic idea is that the probability of at least one path reaching the sink node or base station increases as we have more paths doing data delivery. The most previous research focused on using multipath routing to improve reliability (3), some attention has been paid to using multipath routing to tolerate inside attacks. These studies, still, mainly unobserved the exchange between QoS gain vs. energy consumption which can harmfully shorten the system lifetime. The research problem we are addressing in this paper is efficient redundancy management of a clustered HWSN to extend its lifetime process in the presence of unreliable and malicious nodes. We address the exchange between energy consumption vs. QoS gain in as timeliness, security, and reliability through the goal to exploit the lifetime of a clustered HWSN as fulfilling application QoS requirements in the environment of multipath routing. We study the best amount of redundancy through which data are routed to a remote sink in the presence of unreliable and malicious nodes, so query success probability is exploiting while maximizing the HWSN lifetime. This optimization problem designed for the case in which a voting based distributed intrusion detection algorithm is used to eliminate malicious nodes from the Heterogeneous Wireless sensor network (HWSN). Our contribution is a model-based analysis methodology by which the optimal multipath redundancy levels and intrusion detection settings may be identified for satisfying application QoS requirements while maximizing the lifetime of HWSNs. For the issue of intrusion tolerance through multipath routing, there are two major problems to solve one is many paths to and second one is path to use. To the finest of our information, we are the first to address the how many path to use problem designed for the what path to use problem, our evolution on the before than is different from presented effort in that we do not consider specific routing protocols, nor the of feedback information to explain the trouble. Somewhat, for energy conservation, we a distributed light-weight IDS by
Read full abstract