Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them to the sink via a single hop or multi-hop path. In wireless sensor networks, due to limited battery power of sensor nodes, one of the key challenge is to achieve minimum energy consumption in order to maximize network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is a well known routing protocol in WSN. It is a Clustering based protocol which helps in improving the lifetime of wireless sensor network This paper describes the comparative analysis of LEACH protocol with its various descendant protocols.
Authors and Affiliations
Ravneet Kaur1 , Deepika Sharma2 and Navdeep Kaur
Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile ag...
Improved rtPS SchedulingwithQoE metrics in Joint WiMAX / Satellite Networks
Thispaper improves a previously proposed scheduling algorithm that is responsible to share the allocated capacity to the uplink traffic of an integrated satellite and WiMAX network. The target of this improvement i...
Mobile Ad-hoc Network Simulators, A Survey and Comparisons
Wireless communication technologies have been making growing interest in the past years, which has resulted in many proposals of their new applications. From indoor wireless local area networks to outdoor cellular mobile...
An Efficient Data Hiding Technique for Steganography
Bose Chaudhuri Hochquenghem (BCH) based data hiding scheme for JPEG steganography is presented. Traditional data hiding approaches hide data into each block, where all the blocks are not overlapping each other. Two conse...