Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 4
Abstract
While wireless sensor networks are increasingly equipped to handle more complicated functions, these battery powered sensors which used in network processing, use their constrained energy to enhance the lifetime of the network especially in a heterogeneous settings. Clustered techniques have since been employed to optimize energy consumption in this energy constrained wireless sensor networks. In Classical clustering protocols, equal energy is assigned to all nodes and they cannot take full benefit of the presence of node heterogeneity. SEP, a heterogeneous-aware protocol is used to prolong the time interval before the death of the first node which is crucial for many applications where the feedback from the sensor network must be reliable. The performance of SEP in comparison to LEACH Protocol is analyzed in this paper in which the relation between number of alive node and number of rounds for different base stations and terrain area is analyzed. If the base station is closer to the network nodes die out after more number of rounds when compared to the base station far from the network. For larger terrain area nodes die out after more number of rounds when compared to the smaller terrain area.
Authors and Affiliations
Upasana Sharma , Sunil Tiwari
Facilitating Document Annotation Using Content & Querying Value
Collections of huge, large textual data contains significant amount of structured information, which remains hidden in unstructured text. Relevant information is always difficult to find in these documents. In this paper...
Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...
Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm
Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...
Minimizing Spurious Patterns Using Association Rule Mining
Most of the clustering algorithms extract patterns which are of least interest. Such pattern consists of data items which usually belong to widely different support levels. Such data items belonging to different support...