Title of article :
Decrease Number of Bit ID in Wireless Sensor Network by Using Huffman Algorithm
Author/Authors :
Mohammadi، Parisa نويسنده Department of Biology, Faculty of Science, Alzahra University, Tehran , , Jamali ، Shahram نويسنده , , Analoui، Mortaza نويسنده Department of Computer Engineering, Iran University of Science and Technology. Tehran, Iran. ,
Issue Information :
روزنامه با شماره پیاپی سال 2013
Abstract :
A wireless sensor network consists of many low-cost, low-power sensor nodes, which can perform sensing, simple computation,
and transmission of sensed information. Long distance transmission by sensor nodes is not energy efficient, since energy
consumption is a superliner function of the transmission distance., which can have their batteries And its sensing tasks in a given
environment are doing. It is comprised of one or more master nodes which have sensed data is collected And a central processing
and storage system communicates . A sensor node typically gets its power from a battery. Because a sensor network routing
protocols require a node identifier These identifiers are required in securing these networks require a unique identifier on each
packet has a header . The length of the ID is important in these networks . In this paper we solve the problem of assigning a unique
identifier Huffman offer . We use a unique identifier Huffman codes , short for wireless sensor nodes . Our nodes are organized in a
tree structure .This tree structure is used to calculate the size of the network and then form the Huffman tree to assign a unique ID to
each node deals with the shortest name . Our algorithm for an area with a large number of sensors are simulated using Matlab
software. We then evaluate the performance And the results more casts with the same density and non- uniform density compared
to more casts. This work provides a solution to identify malicious nodes in wireless sensor networks through detection of malicious
message transmissions in a network. A message transmissions considered suspicious if its signal strength is incompatible with its
originator’s geographical position. We provide protocols for detecting suspicious transmissions – and the consequent identification
of malicious nodes – and for disseminating this information in the network. We evaluate the detection rate and the efficiency of our
solution along a number of parameters. The department has been using a new method for assigning Huffman node ID - the ID of the
sensor introduced that will be the least bit.
Journal title :
Journal of Applied Environmental and Biological Sciences
Journal title :
Journal of Applied Environmental and Biological Sciences