Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 5
Abstract
Wireless sensor nodes are highly energy constrained devices. They have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Moreover, most of the Wireless Sensor Network (WSN) applications render it impossible to charge or replace the battery of sensor nodes. Therefore, optimal use of node energy is a major challenge in wireless sensor networks. Clustering of sensor nodes is an effective method to use the node energy optimally and prolong the lifetime of energy constrained wireless sensor network. In this paper, we propose a location based protocol for WSN- supporting an energy efficient clustering, cluster head selection/rotation and data routing method to prolong the lifetime of sensor network. Proposed clustering protocol ensures balanced size cluster formation within the sensing field with least number of transmit-receive operations. Cluster head rotation protocol ensures balanced dissipation of node energy despite the non-uniform energy requirements of cluster head and sensor nodes in a cluster. The cluster head rotation protocol has been proposed to achieve the balanced energy consumption among the nodes within the cluster thus prolonging the lifetime of network Simulation results demonstrate that proposed protocol prolongs network lifetime due to the use of efficient clustering, cluster head selection/rotation and data routing.
Authors and Affiliations
Ashok Kumar, Vinod Kumar, Narottam Chand
Recombinant Skeleton Using Junction Points in Skeleton Based Images
We perform the task of combining two skeleton images and to produce the recombinant skeleton. We propose the recombinant skeleton algorithm to produce the recombinant skeletons. The existing skeleton represen...
LSB based Image Steganography by using the Fast Marching Method
This paper presents a novel approach for image steganography based on the Least Significant Bit (LSB) method. Most traditional LSB methods choose the initial embedding location of the cover image randomly, and the secret...
Deep Transfer Learning Application for Automated Ischemic Classification in Posterior Fossa CT Images
Computed Tomography (CT) imaging is one of the conventional tools used to diagnose ischemic in Posterior Fossa (PF). Radiologist commonly diagnoses ischemic in PF through CT imaging manually. However, such a procedure co...
Verification of Statecharts Using Data Abstraction
We present an approach for verifying Statecharts including infinite data spaces. We devise a technique for checking that a formula of the universal fragment of CTL is satisfied by a specification written as a Statechart....
Implementation and Evaluation of a Secure and Efficient Web Authentication Scheme using Mozilla Firefox and WAMP
User authentication and session management are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, in practice, authentication and session management are imple...