Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them to the sink via a single hop or multi-hop path. In wireless sensor networks, due to limited battery power of sensor nodes, one of the key challenge is to achieve minimum energy consumption in order to maximize network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is a well known routing protocol in WSN. It is a Clustering based protocol which helps in improving the lifetime of wireless sensor network This paper describes the comparative analysis of LEACH protocol with its various descendant protocols.
Authors and Affiliations
Ravneet Kaur1 , Deepika Sharma2 and Navdeep Kaur
Multicast Routing Techniques To Make Optical Network Survivable Against Single Link/Node Failure.
Link/Node failures are very common in any networks but these failures have a huge impact on the overall performance of the network. Due to these link/node failures sometimes it is impossible to communicate in b/w t...
Consistency Maintenance in Fractious P2P System
Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-co...
Security Issues and Sybil Attack in Wireless Sensor Networks
Due to broadcast nature of Wireless Sensor Networks and lack of tamper-resistant hardware, security in sensor networks is one of the major issues. Hence research is being done on many security attacks on wireless...
Fake Access Point Detection and Prevention Techniques
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...