Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network

Abstract

 Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them to the sink via a single hop or multi-hop path. In wireless sensor networks, due to limited battery power of sensor nodes, one of the key challenge is to achieve minimum energy consumption in order to maximize network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is a well known routing protocol in WSN. It is a Clustering based protocol which helps in improving the lifetime of wireless sensor network This paper describes the comparative analysis of LEACH protocol with its various descendant protocols.

Authors and Affiliations

Ravneet Kaur1 , Deepika Sharma2 and Navdeep Kaur

Keywords

Related Articles

Homomorphic Encryption Scheme & Its Application for Mobile Agent Security

Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile ag...

 Improved rtPS SchedulingwithQoE metrics in Joint WiMAX / Satellite Networks

 Thispaper improves a previously proposed scheduling algorithm that is responsible to share the allocated capacity to the uplink traffic of an integrated satellite and WiMAX network. The target of this improvement i...

Mobile Ad-hoc Network Simulators, A Survey and Comparisons

Wireless communication technologies have been making growing interest in the past years, which has resulted in many proposals of their new applications. From indoor wireless local area networks to outdoor cellular mobile...

An Efficient Data Hiding Technique for Steganography

Bose Chaudhuri Hochquenghem (BCH) based data hiding scheme for JPEG steganography is presented. Traditional data hiding approaches hide data into each block, where all the blocks are not overlapping each other. Two conse...

Download PDF file
  • EP ID EP125887
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Ravneet Kaur1, Deepika Sharma2 and Navdeep Kaur (2013).  Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network. International Journal of P2P Network Trends and Technology(IJPTT), 3(1), 51-55. https://europub.co.uk/articles/-A-125887