Enhanced Cluster Head Selection Approach for small scale and large scale network in WSN for improving energy efficiency

Author(s):  
SELVALAKSHMI M ◽  
JEYAKUMAR M K
Author(s):  
De-Ming Liang ◽  
Yu-Feng Li

Label propagation spreads the soft labels from few labeled data to a large amount of unlabeled data according to the intrinsic graph structure. Nonetheless, most label propagation solutions work under relatively small-scale data and fail to cope with many real applications, such as social network analysis, where graphs usually have millions of nodes. In this paper, we propose a novel algorithm named \algo to deal with large-scale data. A lightweight iterative process derived from the well-known stochastic gradient descent strategy is used to reduce memory overhead and accelerate the solving process. We also give a theoretical analysis on the necessity of the warm-start technique for label propagation. Experiments show that our algorithm can handle million-scale graphs in few seconds while achieving highly competitive performance with existing algorithms.


Author(s):  
Bhagyashree Ambore ◽  
Suresh L

Security as well as energy efficiency is one of the most inevitable and challenging problems when it comes it large scale network deployment like INternet-of-Things (IoT). After reviewing existing research work on IoT, it was found that there are discrete set of solution for security as well as for energy. However, there is little research work that has jointly investigated both the problems with respect to IoT. Apart from this, there are also various form of attacks that cost energy of sensors that constitutes core physical devices in IoT. Therefore, these manuscripts present a novel idea for identifying and resisting the security breach within an IoT system ensuring energy efficiency too. Harnessing the modelling capability of game-theory, the proposed system offers a joint solution towards these problems. The simulated outcome of the study is found to offer balance performance for better energy efficiency and robust threat mitigation capability when compared with existing approaches.


2019 ◽  
Vol 9 (11) ◽  
pp. 2343 ◽  
Author(s):  
Swagatika Sahoo ◽  
Akshay M. Fajge ◽  
Raju Halder ◽  
Agostino Cortesi

In the nine years since its launch, amid intense research, scalability is always a serious concern in blockchain, especially in case of large-scale network generating huge number of transaction-records. In this paper, we propose a hierarchical blockchain model characterized by: (1) each level maintains multiple local blockchain networks, (2) each local blockchain records local transactional activities, and (3) partial views (tunable w.r.t. precision) of different subsets of local blockchain-records are maintained in the blockchains at next level of the hierarchy. To meet this objective, we apply abstractions on a set of transaction-records in a regular time interval by following the Abstract Interpretation framework, which provides a tunable precision in various abstract domain and guarantees the soundness of the system. While this model suitably fits to the real-worlds organizational structures, the proposal is powerful enough to scale when large number of nodes participate in a network resulting into an enormous growth of the network-size and the number of transaction-records. We discuss experimental results on a small-scale network with three sub networks at lower-level and by abstracting the transaction-records in the abstract domain of intervals. The results are encouraging and clearly indicate the effectiveness of this approach to control exponential growth of blockchain size w.r.t. the total number of participants in the network.


2013 ◽  
Vol 2013 ◽  
pp. 1-7
Author(s):  
Hui He ◽  
Guotao Fan ◽  
Jianwei Ye ◽  
Weizhe Zhang

It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system’s plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks’ topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology.


2015 ◽  
Vol 4 (2) ◽  
Author(s):  
Nurhayati Nurhayati

Wireless sensor networks users are increasing drastically in communication and technology. They consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. However, the smaller of a device the better it is. The development of device should be user friendly. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In BCDCP, all sensors send data from CH (Cluster Head) and then to BS (Base Station).  BCDCP works well in small-scale network but in large scale network it is not appropriated since it uses much energy for long distance wireless communication. We propose a routing protocol  -  Triangular Clustering  Routing Protocol  (TCRP)  -  to prolong network life time through the balanced energy consumption.  RPTC selects cluster head of triangular shape. The sensor field is divided into energy level and in every level we choose one node as a gate node. This gate node collects data and sends it to the leader node. Finally the leader node sends the aggregated data to the BS. We show TCRP outperforms BCDCP with several experiments. Key words: Wireless Sensor Network, Routing Protocol, Clustering


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yutao Liu ◽  
Yue Li ◽  
Yimeng Zhao ◽  
Chunhui Zhang

Mobile ad hoc networks can be widely used in many scenes, for example, military communication, emergency communication, and 5G wide area coverage as well as ultradense network scenes. A cluster-based network can decrease network overhead effectively and then constitute a large-scale network through extending network scale by clustering and cascading. In view of multiservice simultaneous transmission demand for small-scale dense networking scene and large-scale extended networking scene, a MAC protocol based on scheduling of cluster head is proposed, which can avoid collision and retransmission between nodes effectively, and then the network synchronizing in intercluster and intracluster as well as the time-slot scheduling is solved fast and efficiently. A network synchronization algorithm based on clock spread of the sponsorship node is proposed to achieve network self-synchronizing, and a modified schedule-tree algorithm based on cluster head and exactly sponsorship node is proposed to decrease network overhead and to increase network fairness, then MAC protocol based on scheduling of cluster head is verified by simulated analysis. Finally, a dynamic gateway selection algorithm based on link stability is proposed in this paper to decrease intercluster communication control overhead and improve intercluster communication reliability.


MIS Quarterly ◽  
2016 ◽  
Vol 40 (4) ◽  
pp. 849-868 ◽  
Author(s):  
Kunpeng Zhang ◽  
◽  
Siddhartha Bhattacharyya ◽  
Sudha Ram ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document