scholarly journals A Certain Investigation on Secured and Energy Efficient Data Transmission Techniques Over Wireless Sensor Network

Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1226-1235
Author(s):  
Vasuki C ◽  
Dr. Kavitha S ◽  
Bhuvaneswari S

Wireless sensor networks are greatly utilized by various applications and environments to sense and transmit the data. As wireless sensor network doesn’t have any centralized architecture, there will be various issues occurs in the network such as data transmission failure, data security issues, energy resource limitation and so on. Various authors focused these issues and published different research works to resolve these issues. In this analysis work, energy efficient and secured data transmission techniques introduced by various authors has been discussed in detailed based on their working procedure and simulation methods. And also this research work provided the overall analysis of the research work based on merits and demerits and each and every technique discussed in the literature section. And also, this research work concluded with numerical evaluation between most recent works in terms of energy consumption and security level. This numerical evaluation is done in the NS2 simulation environment.

2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Dae-Young Kim ◽  
Zilong Jin ◽  
Jungwook Choi ◽  
Ben Lee ◽  
Jinsung Cho

In a wireless sensor network, sensor nodes are deployed in an ad hoc fashion and they deliver data packets using multihop transmission. However, transmission failures occur frequently in the multihop transmission over wireless media. Thus, a loss recovery mechanism is required to provide end-to-end reliability. In addition, because the sensor nodes are very small devices and have insufficient resources, energy-efficient data transmission is crucial for prolonging the lifetime of a wireless sensor network. This paper proposes a transmission power control mechanism for reliable data transmission, which satisfies communication reliability through recovery of lost packets. The proposed method calculates packet reception rate (PRR) of each hop to maintain end-to-end packet delivery rate (PDR), which is determined based on the desired communication reliability. Then, the transmission power is adjusted based on the PRR to reduce energy consumption. The proposed method was evaluated through extensive simulations, and the results show that it leads to more energy-efficient data transmission compared to existing methods.


2019 ◽  
Vol 16 (2) ◽  
pp. 633-638
Author(s):  
Hamid Ali Abed Al-Asadi

Wireless sensor network (WSN) is a grid of sensors possessing processor unit and trivial memory unit implanted on them. Trustworthy packet forwarding from nodes to sink seems to be the most substantial purpose of this sensor network. The customary routing algorithms could not be employed at this juncture since the sensor battery power is limited. To provide energy proficiency, sensors are normally grouped as non-overlapping groups. This research work provides a transitory summary on clustering procedures in sensor networks. An energy-efficient distributed clustering approach for impenetrable sensor networks, the Weight based clustering Low Energy Adaptive Clustering Hierarchy (WC-LEACH) is proposed and the outcomes are assessed in contradiction with the prevailing Low Energy Adaptive Clustering Hierarchy (LEACH) and Hybrid Energy Efficient Distributed Clustering (HEED) methodologies. Simulation results obviously display an exceptional enhancement in packet delivery ratio, reduced packet loss, reduced energy consumption, increased throughput and increased lifetime for WSNs.


10.29007/cchb ◽  
2018 ◽  
Author(s):  
Jignesh Joshi ◽  
Dr. Jagdish Rathod ◽  
Dr. Kinita Wandra

This paper proposes energy efficient LEACH protocol for secure data transmission for wireless networks. The proposed work uses Networks Simulator – NS2.27 for the simulation of cluster based routing protocol LEACH in wireless sensor network. The work is to enhance the performance of LEACH in terms of energy saving and secure data transmission. Instead of random selection of Cluster Head (CH) the selection method is based on residual energy and vicinity of the node. With this hybrid approach, the node, which is eligible for the CH, will become cluster head and it enhances the performance of traditional LEACH. Traditional LAECH does not support secure data transmission and authentication of nodes in the clusters. By adding security between CH and CM using XOR function and key management, secure data transmission and authentication is carried out for selected application where security is the most important aspect. The proposed LEACH enhances lifetime of the wireless sensor network with security.


Sign in / Sign up

Export Citation Format

Share Document