MSESEP- Mobile Sink Based ESEP using Reliable Cluster Head and Sorting Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The Wireless Sensor Network (WSN) is composed of sensors. These sensor nodes sense the physical parameters like temperature, pressure, humidity etc. In real time environment these sensors have different energies. In this paper we have assumed three types of sensor nodes. Now a day’s most researchers are focusing on how to increase the network lifetime through efficient use of the energy. Generally the network is divided into a certain number of clusters and then a cluster head is selected from all these sensors randomly. There is a Base Station (BS) or Sink which receives aggregated data from the cluster heads and sends it to the end computer. In the existing protocols the sink is kept fixed which results the problem of data collection from the sensor node’s situated at WSN boundary. In our proposed Extended Stable Election Protocol (ESEP) the sink is kept mobile. To increase the lifetime of the network the concept of reliable cluster head is used. The reliable cluster head will act as secondary cluster head in case the main cluster head would die. We have used a new approach to make the cluster head selection more deterministic i.e. sorting technique which sorts the nodes in the descending manner. The performance evaluation of the proposed ESEP is done on the basis of the First Node Dead (FND), packets sent to base station, packets sent to cluster head and total Network Lifetime. The network simulator MATLAB is used for the simulation. The simulation results show that our proposed ESEP gives better result than the existing ESEP.
Authors and Affiliations
Mohit Kumar Jain , Rajdeep Singh
Exploring Different Forms of Trust towards Trusting Intention in Social Media for E-Commerce Purpose
social media has been described as a platform for sharing information, buying and selling of goods and services through the internet. Thus, it has been described as a place where electronic commerce is been t...
Performance Analysis of Hybrid (supervised and unsupervised) method for multiclass data set
Abstract: Due to the increasing demand for multivariate data analysis from the various application the dimensionality reduction becomes an important task to represent the data in low dimensional space for the robus...
Enabling Lazy Learning for Uncertain Data Streams
Abstract: Lazy learning concept is performing the k-nearest neighbor algorithm, Is used to classification andsimilarly to clustering of k-nearest neighbor algorithm both are based on Euclidean distance based algori...
An Enhanced Detection of Outlier using Independent Component Analysis among Multiple Data Instances via Oversampling
Abstract: Anomaly is a pattern of data that does not conforms to expected behavior. It is also referred as outlier, exceptions, peculiarities, surprise etc. Anomaly detection aims to identify a small group of insta...
Intrusion Detection System using Apache Spark Analytic System
In this study, an Intrusion Detection System (IDS) is proposed based on the use of machine learning and distributed computing. The proposed system uses classification techniques that are implemented in the built-in machi...