scholarly journals A Modified Leach Algorithm Using Hard and Soft Threshold in Wireless Sensor Network: A Review

2015 ◽  
Vol 14 (10) ◽  
pp. 6142-6146
Author(s):  
Gurpreet Kaur ◽  
Vishal Arora

Wireless sensor networks have become increasingly popular due to their wide range of application. Clustering sensor nodes organizing them hierarchically have proven to be an effective method to provide better data aggregation and scalability for the sensor network while conserving limited energy. Minimizing the energy consumption of a wireless sensor network application is crucial for effective realization of the intended application in terms of cost, lifetime, and functionality. However, the minimizing task is hardly possible as no overall energy cost function is available for optimization. In this paper, we have proposed a modified alogirthm of leach where hard and soft threshold values will be applied for improving the overall throughput and network lifetime.

2017 ◽  
Vol 16 (3) ◽  
pp. 6213-6218
Author(s):  
Ramandeep Kaur ◽  
Dinesh Kumar

Wireless sensor networks have become increasingly popular due to their wide range of application. Clustering sensor nodes organizing them hierarchically have proven to be an effective method to provide better data aggregation and scalability for the sensor network while conserving limited energy. Minimizing the energy consumption of a wireless sensor network application is crucial for effective realization of the intended application in terms of cost, lifetime, and functionality. However, the minimizing task is hardly possible as no overall energy cost function is available for optimization. In this paper, we have proposed a modified alogirthm of leach where hard and soft threshold values will be applied for improving the overall throughput and network lifetime.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879584 ◽  
Author(s):  
Danyang Qin ◽  
Yan Zhang ◽  
Jingya Ma ◽  
Ping Ji ◽  
Pan Feng

Due to the advantages of large-scale, data-centric and wide application, wireless sensor networks have been widely used in nowadays society. From the physical layer to the application layer, the multiply increasing information makes the data aggregation technology particularly important for wireless sensor network. Data aggregation technology can extract useful information from the network and reduce the network load, but will increase the network delay. The non-exchangeable feature of the battery of sensor nodes makes the researches on the battery power saving and lifetime extension be carried out extensively. Aiming at the delay problem caused by sleeping mechanism used for energy saving, a Distributed Collision-Free Data Aggregation Scheme is proposed in this article to make the network aggregate data without conflicts during the working states periodically changing so as to save the limited energy and reduce the network delay at the same time. Simulation results verify the better aggregating performance of Distributed Collision-Free Data Aggregation Scheme than other traditional data aggregation mechanisms.


Author(s):  
Ashim Pokharel ◽  
Ethiopia Nigussie

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.


In the recent field of research the wireless sensor network plays an important role. Wireless sensor network is an important technology in this era. A Wireless Sensor Network (WSN) is a distributed network contains enormous sensor nodes with wide range of application. It transmits unlimited and enormous data like image, video, audio and data through end to end network. WSNs offer much solution to remote real time monitoring, recognition of physical occurrence and target tracking applications. This network growth is increasingly rapidly day by day and made the research field in difficult resurgence. The extended network lifetime, effective load balancing and scalability are essential for WSNs. The life time of the wireless network can be extended by the concept of clustering .Clustering is process of grouping the smaller localized networks in highly structured way. Diverse cluster technology available based on the network the clustering concept will be used. Efficient routing algorithm provide the way for efficient usage of bandwidth and reduce the delay in the network . This paper provides the survey of clustering and routing protocols to improve the efficiency in wireless technology in recent years


2017 ◽  
Vol 16 (2) ◽  
pp. 7586-7590
Author(s):  
Amneet Kaur ◽  
Harpreet Kaur

A Wireless Sensor Network or WSN is supposed to be made up of a large number of sensors and at least one base station. The sensors are autonomous small devices with several constraints like the battery power, computation capacity, communication range and memory. They also are supplied with transceivers to gather information from its environment and pass it on up to a certain base station, where the measured parameters can be stored and available for the end user. In most cases, the sensors forming these networks are deployed randomly and left unattended to and are expected to perform their mission properly and efficiently. As a result of this random deployment, the WSN has usually varying degrees of node density along its area. Sensor networks are also energy constrained since the individual sensors, which the network is formed with, are extremely energy-constrained as well. Wireless sensor networks have become increasingly popular due to their wide range of application. Clustering sensor nodes organizing them hierarchically have proven to be an effective method to provide better data aggregation and scalability for the sensor network while conserving limited energy. Minimizing the energy consumption of a wireless sensor network application is crucial for effective realization of the intended application in terms of cost, lifetime, and functionality. However, the minimizing task is hardly possible as no overall energy cost function is available for optimization.


2013 ◽  
Vol 347-350 ◽  
pp. 965-969
Author(s):  
Na Wang ◽  
Yue Ping Wu

One of the critical tasks in designing a wireless sensor network is to monitor, detect, and report various useful occurrences of events in the network domain which are determined by the result of data aggregation. Fault tolerance is critical to the efficiency of data aggregation scheme. One important reason is that sensor nodes are neither reliable nor stabile. In this paper, we present an improved k-means data aggregation algorithm considering the proposal of isolated point. Each cluster includes three types of sets: aggregation data, fault data set and abnormal data set. Aggregation data comes from normal sensors in this cluster through the improved K-means aggregation algorithm and abnormal nodes can be detected according to the aggregation result.


2021 ◽  
Author(s):  
Mohamed Younis Mohamed Alzarroug ◽  
Wilson Jeberson

Wireless sensor networks (WSNs) consist of large number of sensor nodes densely deployed in monitoring area with sensing, wireless communications and computing capabilities. In recent times, wireless sensor networks have used the concept of mobile agent for reducing energy consumption and for effective data collection. The fundamental functionality of WSN is to collect and return data from the sensor nodes. Data aggregation’s main goal is to gather and aggregate data in an efficient manner. In data gathering, finding the optimal itinerary planning for the mobile agent is an important step. However, a single mobile agent itinerary planning approach suffers from two drawbacks, task delay and large size of the mobile agent as the scale of the network is expanded. To overcome these drawbacks, this research work proposes: (i) an efficient data aggregation scheme in wireless sensor network that uses multiple mobile agents for aggregating data and transferring it to the sink based on itinerary planning and (ii) an attack detection using TS fuzzy model on multi-mobile agent-based data aggregation scheme is shortly named as MDTSF model.


2020 ◽  
Vol 16 (3) ◽  
pp. 155014772091295 ◽  
Author(s):  
Hongtao Song ◽  
Shanshan Sui ◽  
Qilong Han ◽  
Hui Zhang ◽  
Zaiqiang Yang

Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. This fact calls for special requirements for network protocol design, security assessment models, and energy-efficient algorithms. Data aggregation is an effective energy conservation technique, which removes redundant information from the data aggregated from neighbor sensor nodes. How to further improve the effectiveness of data aggregation plays an important role in improving data collection accuracy and reducing the overall network energy consumption. Unfortunately, sensor nodes are normally deployed in an open environment and thus are subject to various attacks conducted by adversaries. Consequently, data aggregation brings new challenges to wireless sensor network security. In this article, we propose a novel secure data aggregation solution based on autoregressive integrated moving average model, a time series analysis technique, to prevent private data from being learned by adversaries. We leverage the autoregressive integrated moving average model to predict the data volume in sensor nodes, and update and synchronize the model as needed. The experimental results demonstrate that our model provides accurate predictions and that, compared with competing methods, our solution achieves better security, lower computation and communication costs, and better flexibility.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Chaoran Li ◽  
Yun Liu

Wireless sensor network is a self-organizing multihop network, which is composed of a large number of wireless sensor nodes and usually deployed in unattended environment to collect target information. At present, WSN is facing a growing range of security threats owing to its wireless and resource-constrained characteristics. Compromised sensor nodes can easily corrupt data accuracy and integrity by falsifying sensed information, selectively forwarding or misdirecting received data packets during the process of data aggregation. To solve these security problems, we propose a smart reputation-based data aggregation protocol for WSNs (SRDA) that can provide adequate protection of data accuracy and integrity for wireless sensor network. The simulation results indicate that SRDA can effectively identify the compromised nodes and isolate them from the network by the deployment of the smart reputation system.


2019 ◽  
Vol 8 (2) ◽  
pp. 3366-3371

A Wireless Sensor Network is a set of sensor nodes that are integrated with a physical environment. This tiny sensor node capable of sensing physical phenomena and it can process the sense data. Sensor nodes radio range is short so they transfer data in a multihop manner to form network which will send network activities to base station. Data transmission consumes much more energy than computation. So to overcome this problem data aggregation technique can be useful. This approach reduces energy consumption by avoiding repeated data. Security in wireless sensor network is also one of the important issues. Some properties of a WSN make it more harmed by certain types of attackers, compared to traditional wired network. Furthermore, constrained devices create their own problems for wireless sensor network. As sensor node is powered by batteries and node required lot of energy to perform some complex computation. So it is important to prevent every node in computation process which will save energy to gain longer network life. The focus of this work is provides confidentiality protecting hierarchical concealed data aggregation for WSN using privacy homomorphism. End to End Homomorphic Paillier cryptoscheme is used to achieve proposed approach.


Sign in / Sign up

Export Citation Format

Share Document