Advertisement

Energy-Efficient LEACH Protocol with Multipower Amplification for Wireless Sensor Networks

  • A. KrishnakumarEmail author
  • V. Anuratha
Chapter

Abstract

Wireless sensor networks (WSNs) become an emerging field for human developments. In this field, the more number of researches is still under processing. Sensors are grouped to generate clusters to collect and forward the data using Cluster Head (CH). In this work, the traditional LEACH protocol is chosen for observation. Cluster formation is considered for this scheme. The proposed model introduces the threshold energy and power amplification metrics which add together with the LEACH’s probability function. The Novel scheme identifies the purpose of the proposed metrics and compared with some of the existing modified LEACH schemes. The comparison is processed using simulation, and the results show the proposed scheme shows betterment.

Keywords

LEACH Power amplification Threshold function Probability function Wireless sensor network 

References

  1. 1.
    Jose, D. V., & Sadashivappa, G. (2015). Mobile sink assisted energy efficient routing algorithm for wireless sensor networks. The World of Computer Science and Information Technology Journal (WCSIT), 5(2), 16–22.Google Scholar
  2. 2.
    Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000 (10 pp). IEEE.Google Scholar
  3. 3.
    Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.CrossRefGoogle Scholar
  4. 4.
    Jan, M., Nanda, P., Usman, M., & He, X. (2016). PAWN: A payload-based mutual authentication scheme for wireless sensor networks. In Concurrency and computation: Practice and experience.CrossRefGoogle Scholar
  5. 5.
    Purohit, R., & Bhargava, D. (2017). An illustration to secured way of data mining using privacy preserving data mining. Journal of Statistics and Management Systems, 20(4), 637–645.CrossRefGoogle Scholar
  6. 6.
    Bhargava, D. (2017). Intelligent agents and autonomous robots. In Detecting and mitigating robotic cyber security risks (pp. 275–283). IGI Global.Google Scholar
  7. 7.
    Khurana, S., & Rekha, K. R. (2016). Energy efficient of inter cluster multihop routing protocol for wireless sensor network.Google Scholar
  8. 8.
    Joshi, J., Awasthi, P., Mukherjee, S., Kumar, R., Kurian, D. S., & Deka, M. J. (2016, May). SEED: Secure and energy efficient data transmission in Wireless Sensor Networks. In 2016 4th International Conference on Information and Communication Technology (ICoICT) (pp. 1–6). IEEE.Google Scholar
  9. 9.
    Chamam, A., & Pierre, S. (2010). A distributed energy-efficient clustering protocol for wireless sensor networks. Computers & Electrical Engineering, 36(2), 303–312.CrossRefGoogle Scholar
  10. 10.
    Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013, October). MODLEACH: A variant of LEACH for WSNs. In 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (pp. 158–163). IEEE.Google Scholar
  11. 11.
    Vyas, S., & Vaishnav, P. (2017). A comparative study of various ETL process and their testing techniques in data warehouse. Journal of Statistics and Management Systems, 20(4), 753–763.CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of PG Computer ScienceSree Saraswathi Thyagaraja CollegePollachiIndia

Personalised recommendations