International Research Journal of Commerce , Arts and Science

 ( Online- ISSN 2319 - 9202 )     New DOI : 10.32804/CASIRJ

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 108    Submit Your Rating     Cite This   Download        Certificate

NETWORK EVALUATION IN ENERGY EFFICIENT PROTOCOL AND LEACH PROTOCOL FOR WIRELESS SENSOR NETWORK

    2 Author(s):  NITIN BANSAL , RAJ KUMAR

Vol -  5, Issue- 1 ,         Page(s) : 7 - 20  (2014 ) DOI : https://doi.org/10.32804/CASIRJ

Abstract

We have proposed an improved routing algorithm using LEACH so that network lifetime will be improved. The main problem with LEACH protocol lies in the random selection of cluster heads. There exists a probability that the cluster heads formed are unbalanced and may remain in one part of the network making some part of the network unreachable. This problem is resolved by using modified EEP routing protocol. Advances in technology recently have enabled the mass production of small sized battery powered sensor nodes. A wireless sensor network (WSN) consists of hundreds or thousands of sensor nodes [1].

order online online

1. Kun Zhang and Cong Wang , “A Secure Routing Protocol for Cluster-Based  Wireless Sensor Networks Using Group Key  Management ,”  IEEE Xplore,vol.37, pp. 178-185, jan.-2008.
2. Bolian Yin, Hongchi Shi, and Yi Shang ,”Analysis of Energy Consumption in Clustered Wireless Sensor Networks” IEEE Transactions on Mobile Computing, vol. 3, pp. 272–285, July 2007
3. Zhao Yulan and Jiang Chunfeng,”Research about Improvement of LEACH Protocol”, An Energy Efficient Protocol for Wireless Sensor Network”. Application Research of Computers, No.2 pp: 209-211, Jan. 2005.
4. Stephan Olariu and Qingwen Xu, I”nformation Assurance In Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, 3(4), pp. 317-331 , Dec.2004.
5. ZenonChaczko, RyszardKlempous and Jan Nikodem,” Methods of Sensors Localization in Wireless Sensor Network”, IEEE Transactions On Mobile Computing, VOL. 3, pp. 3, Jul-Sep 2004.
6. Adrian Perrig , John Stankovic and David Wagner,” Security in wireless sensor network”,. Vol. 47, pp.6-9 ,June 2004.
7. Jan Steffan ,LudgerFiege, Mariano Cilia and Alejandro Buchmann, “Scoping in Wireless Sensor Networks”, IEEE Network, 18(1), pp.15–21, May 2004.
8. Zhiwei Zhao, Xinming Zhang, Peng Sun and Pengxi Liu,” A Transmission    Power Control MAC Protocol for Wireless Sensor Networks”, IEEE/ACM Tran. on Networking, , 12(3), pp.493-506,April 2004.
9. Shao-Long and Xing Tao, “Cluster-based power efficient time synchronization in wireless sensor networks”, IEEE INFOCOM  Conf, Mar. 2004.
10. John Buckley, Kevin Aherne and CianO'Mathuna, “Antenna Performance Measurements Using Wireless Sensor Networks”, Proceedings of the IEEE, VOL. 91, pp. 1247-1256, August 2003.
11. Peng-Jun Wan, Member and Chih-Wei Yi, “Coverage by Randomly Deployed Wireless Sensor Networks”, IEEE Wireless Communications and Networking Conference, pp.16–20,Mar. 2003.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details