Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network

Abstract

 Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them to the sink via a single hop or multi-hop path. In wireless sensor networks, due to limited battery power of sensor nodes, one of the key challenge is to achieve minimum energy consumption in order to maximize network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is a well known routing protocol in WSN. It is a Clustering based protocol which helps in improving the lifetime of wireless sensor network This paper describes the comparative analysis of LEACH protocol with its various descendant protocols.

Authors and Affiliations

Ravneet Kaur1 , Deepika Sharma2 and Navdeep Kaur

Keywords

Related Articles

 Multicast Routing Techniques To Make Optical Network Survivable Against Single Link/Node Failure.

 Link/Node failures are very common in any networks but these failures have a huge impact on the overall performance of the network. Due to these link/node failures sometimes it is impossible to communicate in b/w t...

 Consistency Maintenance in Fractious P2P System

 Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-co...

 Security Issues and Sybil Attack in Wireless Sensor Networks

 Due to broadcast nature of Wireless Sensor Networks and lack of tamper-resistant hardware, security in sensor networks is one of the major issues. Hence research is being done on many security attacks on wireless...

 Fake Access Point Detection and Prevention Techniques

 There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...

Download PDF file
  • EP ID EP125887
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Ravneet Kaur1, Deepika Sharma2 and Navdeep Kaur (2013).  Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network. International Journal of P2P Network Trends and Technology(IJPTT), 3(1), 51-55. https://europub.co.uk/articles/-A-125887