International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 227

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.4 / 10


     

A Dynamic Two key Factor Technique Security Adoption in WSN (Improved LEACH)

P. Sravani, R. Veerababu


Abstract: Wireless Sensor Networks (WSNs) have great potential to support several important wireless applications, including real-time multimedia communication, medical applications, surveillance using sensor networks, industrial applications, military surveillance and home networking applications. But there are two challenging issues (i) communication bandwidth and (ii) energy are very important to design wireless and mobile systems because these are very much limited in network environment. Therefore it requires intelligent communication and design techniques to increase bandwidth as well as energy efficient protocol. The most efficient routing protocol LEACH (Lower Energy Adaptive Clustering Hierarchy) in wireless sensor networks (WSNs) has been incorporated by Heinzelman et. al. LEACH uses the concept of dynamic clustering when sensor nodes are deploying randomly where number of cluster impact on the network. This paper describes the network quality that depends on different characteristics of data transmission as a Modification on LEACH protocol. In this paper, we discussed and explain the comparison of magnitude, phase, phase delay, group delay, amplitude of broadcasting and energy consumption respectively.


Keywords: Protocol, Improved LEACH protocol, lifetime, Wireless Sensor Network


Edition: Volume 4 Issue 11, November 2015


Pages: 228 - 230



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
P. Sravani, R. Veerababu, "A Dynamic Two key Factor Technique Security Adoption in WSN (Improved LEACH)", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 228-230, https://www.ijsr.net/getabstract.php?paperid=SUB158840, DOI: https://www.doi.org/10.21275/SUB158840



Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article



Top