Modified Leach in Wireless Sensor Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Wireless sensor network consists of large number of sensor nodes which is used to capture environmental conditions, process and transfer it to base station. These sensor nodes are sensitive to energy consumption and gets exhausted on working. So we need to emphasize on reducing energy dissipation of sensor nodes in order to improve network lifetime. Various routing protocols are developed to enhance network scalability and stability. The cluster based routing is an efficient way of reducing energy dissipation by limiting data transmission from nodes to base station. For this purpose we proposed a new routing method which improves the life span of network, its data transmitting capability with low energy consumption. It is an improvised version of LEACH protocol which conserves energy by load balancing .Multi hop routing is proposed for the transmission of data. Reduction of energy consumption is achieved with the help of TDMA scheduling. Time division multiple access (TDMA)-based MAC can potentially reduce the delay and provide real-time guarantees as well as save power by eliminating collisions. To keep network alive we had added a random node on replacement of dyeing node. The performance evaluation of protocol is based on simulation test performed in network simulator 2 (NS2) to prove the effectiveness of this proposed method in terms of network lifetime and energy efficiency
Authors and Affiliations
Nabeela Ansari , Raj Kumar Paul
Dynamic Query Processing and Optimization in Relational Complex Databases with Keyword Search
Abstract: Dynamic queries are a novel approach to information seeking that may enable users to cope with information overload. They allow users to see an overview of the database, rapidly explore and conveniently filter...
Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...
Providing The Security Against The DDOS Attack In Mobile AdHoc Networks
Abstract: The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETsnodes are joining to any point and leave the network at any point of time. This generic characteristic of MA...
Health Diagnosis Using Wban Technology
Abstract: Invention of the low power consuming wireless sensors are raising the emergence for the usage of wireless body area networks (WBAN).WBAN is widely used in many applications such as entertainment, gaming,...
A Secured Agent-Based Framework for Data Warehouse Management
Managing data warehouses (DWs) is typically characterized by intensive data processing and protracted activities which usually degrade performance. Moreover, DWs are usually designed with the overall objective...