Enhanced Threshold Sensitive Stable Election Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: A wireless sensor network (WSN) consists of inexpensive power constrained sensor nodes collectingdata from the sensing area and transmits data towards the base station in a synergetic way. The basic goal ofwireless sensor network is to enhance the node lifespan, stability period and throughput of network. The WSNnodes are restricted by energy, storage capacity, and computing power. So clustering is used to improve lifetimeand stability. Cluster routing protocol plays an important role for improvement of energy and stability of thenetwork. In this paper a new technique Enhance Threshold Sensitive Stable Election Protocol (ETSEP) isproposed and evaluated for heterogeneous wireless sensor network. In this technique cluster head electionprobability dynamically changes. The ETSEP is simulated using MATLAB and found that it performs better thanStable Election Protocol (SEP) ,Threshold Sensitive Stable Election protocol (TSEP) and Zonal Stable ElectionProtocol(ZSEP) in terms of stability and network lifetime. ETSEP builds more stable routing environment ascompared to SEP, TSEP and ZSEP. Simulation results shows that our protocol performs better than SEP, TSEPand ZSEP.
Authors and Affiliations
Shekhar Kumar , S K Verma
Trust Modeling Scheme using Cluster Aggregation of Messages for Vehicular Ad hoc Networks
Abstract: A VANET is a decentralized network as every node performs the functions of both host and router. The main benefit of VANET communication is the enhanced passenger safety by virtue of exchanging warning messages...
An Effective Approach to Discern Leaders in Wireless Sensor Networks
The influential significance across individual vertices in a Wireless Network raises a concern for the effective evaluation for Centrality metrics. A graph-theoretical comparison between the behaviour of betweenness, clo...
Classifying Evaluation Secure Patterns under Attacks
Abstract: Pattern Classification is one division for machine discovering that spotlights on acknowledgment of examples and regularities in information. In antagonistic applications such as biometric verification, spam si...
Improvising Data Locality and Availability in Hbase Ecosystem
Abstract: In this paper, we try to represent the importance of data locality with the HBase architecture. HBase has a dynamic master slave architecture but the emphasis on data locality, i.e. getting the logic or p...
Using NP Problems to Share Keys in Secret-Key Cryptography
Abstract: Public key cryptography has now become an important means for providing confidentiality by its use of key distribution, in which users can do private communication with the help of encryption keys. It also prov...