Downloads: 113 | Views: 227
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.4 / 10
A Dynamic Two key Factor Technique Security Adoption in WSN (Improved LEACH)
P. Sravani, R. Veerababu
Abstract: Wireless Sensor Networks (WSNs) have great potential to support several important wireless applications, including real-time multimedia communication, medical applications, surveillance using sensor networks, industrial applications, military surveillance and home networking applications. But there are two challenging issues (i) communication bandwidth and (ii) energy are very important to design wireless and mobile systems because these are very much limited in network environment. Therefore it requires intelligent communication and design techniques to increase bandwidth as well as energy efficient protocol. The most efficient routing protocol LEACH (Lower Energy Adaptive Clustering Hierarchy) in wireless sensor networks (WSNs) has been incorporated by Heinzelman et. al. LEACH uses the concept of dynamic clustering when sensor nodes are deploying randomly where number of cluster impact on the network. This paper describes the network quality that depends on different characteristics of data transmission as a Modification on LEACH protocol. In this paper, we discussed and explain the comparison of magnitude, phase, phase delay, group delay, amplitude of broadcasting and energy consumption respectively.
Keywords: Protocol, Improved LEACH protocol, lifetime, Wireless Sensor Network
Edition: Volume 4 Issue 11, November 2015
Pages: 228 - 230
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 805 - 811Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method
Aruna Reddy H., Shivamurthy G., Rajanna M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey