Performance Analysis of Adapted Selection Based Protocol Over LEACH Protocol

In wireless sensor network, sensor nodes nearer to sink will drain their energy rapidly in comparison to the sensor nodes that are far-flung from the sink. This is because they will have to forward enormous amount of data in the course of multi-hop commun

  • PDF / 366,135 Bytes
  • 10 Pages / 439.37 x 666.142 pts Page_size
  • 11 Downloads / 221 Views

DOWNLOAD

REPORT


Abstract In wireless sensor network, sensor nodes nearer to sink will drain their energy rapidly in comparison to the sensor nodes that are far-flung from the sink. This is because they will have to forward enormous amount of data in the course of multi-hop communication which further reduces the lifetime of system. One of the main research issues is how to enhance network lifetime. In this paper, an adapted selection established protocol is suggested, judgment of picking cluster heads through sink is totally created on basis of connected extra energy, location of node, and remaining energy of node. Congested link concept has been used to find a shorter path while transmission of data from cluster head to sink. Simulation outcomes display that the proposed routing protocol is superior to present LEACH protocol. Keywords Wireless sensor network routing Energy



 Nodes  Base station  Routing  Multipath

1 Introduction A wireless sensor network is one of the core next-generation application fields. It has been applied in a variety of fields, such as ecosystem monitoring, military zone surveillance, and U-City applications [1]. A wireless sensor network consists of multiple sensor nodes that can perform environment information collection, computation, and wireless communication [2]. A wireless sensor network collects R. Priyadarshi (&)  S. Yadav  D. Bilyan Electronics and Communication Engineering Department, National Institute of Technology, Hamirpur, India e-mail: [email protected] S. Yadav e-mail: [email protected] D. Bilyan e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2019 A. K. Luhach et al. (eds.), Smart Computational Strategies: Theoretical and Practical Aspects, https://doi.org/10.1007/978-981-13-6295-8_21

247

248

R. Priyadarshi et al.

environment information by utilizing sensor modules and analyzes collection information with various applications. However, the performance of sensor nodes in sensor networks is limited in terms of energy, computational capability, communication radius, and storage memory [3–7]. Therefore, the algorithms of all wireless sensor network schemes should be studied to minimize energy consumption by utilizing energy efficiently and considering the limited performance of sensor nodes. Wireless sensor networks are vulnerable to external attacks, as they are constructed mostly in unmanned environments to monitor environmental information or military zones, and sensor nodes use wireless communication to transfer collected data to base stations [8–10]. Due to such characteristics, data can be easily exposed during data transmission. This can be a serious problem in applications that deal with military information or individual privacy. To solve these problems, studies on security schemes have been performed. To configure a safe sensor network, it is possible to combine a routing protocol, which is a basic element for information transmission, with an encryption protocol, such as key exchange and authentication. Recently, the various data transmiss