Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 4
Abstract
While wireless sensor networks are increasingly equipped to handle more complicated functions, these battery powered sensors which used in network processing, use their constrained energy to enhance the lifetime of the network especially in a heterogeneous settings. Clustered techniques have since been employed to optimize energy consumption in this energy constrained wireless sensor networks. In Classical clustering protocols, equal energy is assigned to all nodes and they cannot take full benefit of the presence of node heterogeneity. SEP, a heterogeneous-aware protocol is used to prolong the time interval before the death of the first node which is crucial for many applications where the feedback from the sensor network must be reliable. The performance of SEP in comparison to LEACH Protocol is analyzed in this paper in which the relation between number of alive node and number of rounds for different base stations and terrain area is analyzed. If the base station is closer to the network nodes die out after more number of rounds when compared to the base station far from the network. For larger terrain area nodes die out after more number of rounds when compared to the smaller terrain area.
Authors and Affiliations
Upasana Sharma , Sunil Tiwari
RW-Homeomorphism in Topological Spaces
A bijection f:(X,)→(Y, σ) is called regular weakly homeomorphism if f and f[sup]-1[/sup] are rw-continuous. Also we introduce new class of maps namely rw-homeomorphism. This class of maps is closed under composition of...
Integrating Security and Usability at Requirement Specification Process
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers...
A Novel Technique in Cryptography for Data Hiding i n Digital Images
Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally...
Aligning Cloud Computing Security with Business Strategy
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be help...
Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS
Recent developments in the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem and publically available web based Geographical Information Systems (GIS)have enab...