Estimation of Secured Wireless Sensor Networks and Its Significant Observation for Improving Energy Efficiency Using Cross-Learning Algorithms

Author(s):  
Sirasani Srinivasa Rao ◽  
K. Butchi Raju ◽  
Sunanda Nalajala ◽  
Ramesh Vatambeti

Wireless sensor networks (WSNs) have as of late been created as a stage for various significant observation and control applications. WSNs are continuously utilized in different applications, for example, therapeutic, military, and mechanical segments. Since the WSN is helpless against assaults, refined security administrations are required for verifying the information correspondence between hubs. Because of the asset limitations, the symmetric key foundation is considered as the ideal worldview for verifying the key trade in WSN. The sensor hubs in the WSN course gathered data to the base station. Despite the fact that the specially appointed system is adaptable with the variable foundation, they are exposed to different security dangers. Grouping is a successful way to deal with vitality productivity in the system. In bunching, information accumulation is utilized to diminish the measure of information that streams in the system.

2007 ◽  
Vol 06 (02) ◽  
pp. 235-251 ◽  
Author(s):  
GUANGYAN HUANG ◽  
XIAOWEI LI ◽  
JING HE ◽  
XIN LI

Clustering is applied in wireless sensor networks for increasing energy efficiency. Clustering methods in wireless sensor networks are different from those in traditional data mining systems. This paper proposes a novel clustering algorithm based on Minimal Spanning Tree (MST) and Maximum Energy resource on sensors named MSTME. Also, specified constrains of clustering in wireless sensor networks and several evaluation metrics are given. MSTME performs better than already known clustering methods of Low Energy Adaptive Clustering Hierarchy (LEACH) and Base Station Controlled Dynamic Clustering Protocol (BCDCP) in wireless sensor networks when they are evaluated by these evaluation metrics. Simulation results show MSTME increases energy efficiency and network lifetime compared with LEACH and BCDCP in two-hop and multi-hop networks, respectively.


2021 ◽  
Vol 11 (4) ◽  
pp. 4082-4095
Author(s):  
G. Chenna Kesava Reddy ◽  
Dr.A.A. Ansari ◽  
Dr.S. China Venkateswarlu

Energy efficiency is a significant issue in portable wireless networks since the battery life of versatile terminals is restricted. Protection of battery power has been tended to utilizing numerous procedures. Wireless sensor networks (WSNs), framed by various little gadgets fit for detecting, processing, and wireless correspondence are arising as a progressive innovation, with applications in different territories. The novel highlights of wireless sensor networks have carried new difficulties and issues to the field of conveyed and communitarian data preparing. In the light of the importance of reducing operating consumpt and maintaining cellular network profitability, energy efficiency in cell networks has received a crucial consideration from both scholars and the business, despite the fact that these networks are “green communication.” Since the base station is the most important energy buyer in the business, efforts have been undertaken to review the use of the base station and to identify ways to energy efficiency improvements. The trade-offs between energy utilization and throughput, under nearby just as under helpful detecting, are portrayed. The Energy efficient tradeoffs have been arranged dependent on every convention layer and examined its effect in the organization energy efficiency.


Author(s):  
Ali Al-Qamaji ◽  
Baris Atakan

AbstractWireless sensor networks (WSNs) consist of compact deployed sensor nodes which collectively report their sensed readings about an event to the Base Station (BS). In WSNs, due to the dense deployment, sensor readings can be spatially correlated and it is nonessential to transmit all their readings to the BS. Therefore, for more energy efficient, it is vital to choose which sensor node should report their sensed readings to the BS. In this paper, the event distortion-based clustering (EDC) algorithm is proposed for the spatially correlated sensor nodes. Here, the sensor nodes are assumed to harvest energy from ambient electromagnetic radiation source. The EDC algorithm allows the energy-harvesting sensor nodes to select and eliminate nonessential nodes while maintain an acceptable level of distortion at the BS. To measure the reliability, a theoretical framework of the distortion function is first derived for both single-hop and two-hop communication scenarios. Then, based on the derived theoretical framework, the EDC algorithm is introduced. Through extensive simulations, the performance of the EDC algorithm is evaluated in terms of achievable distortion level, number of alive nodes and harvested energy levels. As a result, EDC algorithm can successfully exploit both the spatial correlation and energy harvesting to improve the energy efficiency while preserving an acceptable level of distortion. Furthermore, the performance comparisons reveal that the two-hop communication model outperforms the single-hop model in terms of the distortion and energy-efficiency.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4579 ◽  
Author(s):  
Yang Liu ◽  
Qiong Wu ◽  
Ting Zhao ◽  
Yong Tie ◽  
Fengshan Bai ◽  
...  

Cluster-based hierarchical routing protocols play an essential role in decreasing the energy consumption of wireless sensor networks (WSNs). A low-energy adaptive clustering hierarchy (LEACH) has been proposed as an application-specific protocol architecture for WSNs. However, without considering the distribution of the cluster heads (CHs) in the rotation basis, the LEACH protocol will increase the energy consumption of the network. To improve the energy efficiency of the WSN, we propose a novel modified routing protocol in this paper. The newly proposed improved energy-efficient LEACH (IEE-LEACH) protocol considers the residual node energy and the average energy of the networks. To achieve satisfactory performance in terms of reducing the sensor energy consumption, the proposed IEE-LEACH accounts for the numbers of the optimal CHs and prohibits the nodes that are closer to the base station (BS) to join in the cluster formation. Furthermore, the proposed IEE-LEACH uses a new threshold for electing CHs among the sensor nodes, and employs single hop, multi-hop, and hybrid communications to further improve the energy efficiency of the networks. The simulation results demonstrate that, compared with some existing routing protocols, the proposed protocol substantially reduces the energy consumption of WSNs.


Author(s):  
Mahendra Sharma ◽  
Santhosh Kumar Singh

Wireless Sensor Networks (WSNs) assume a crucial part in the field of mechanization and control where detecting of data is the initial step before any automated job could be performed. So as to encourage such perpetual assignments with less vitality utilization proportion, clustering is consolidated everywhere to upgrade the system lifetime. Unequal Cluster-based Routing (UCR) [7] is a standout amongst the most productive answers for draw out the system lifetime and to take care of the hotspot issue that is generally found in equivalent clustering method. In this paper, we propose Tentative Route (TRS) Selection approach for irregular Clustered Wireless Sensor Networks that facilitates in decision an efficient next relay to send the data cumulative by Cluster Heads to the Base Station. Simulation analysis is achieved using the network simulator to demonstrate the effectiveness of the TRS method.


2019 ◽  
Vol 16 (9) ◽  
pp. 3961-3964
Author(s):  
Charu Sharma ◽  
Rohit Vaid

In designing Wireless Sensor Networks, energy efficiency and security should be considered very critically. Energy efficiency is achieved through data aggregation which eliminates the transmission of redundant data while security is achieved by preserving confidentiality among sensor node and the base station. In this paper, an energy efficient and secure cluster based aggregation mechanism is presented. In this model, for energy efficiency the network is divided into tracks and sectors so the cluster head’s are uniformly selected from the whole network. To achieve security the cluster head’s perform data aggregation with the help of some pattern codes and only distinctive data is transmitted from sensor nodes in encrypted form. To perform aggregation, the sensor nodes do not need to know about the actual sensor data therefore there is no need to use any encryption or decryption schemes between nodes and cluster head. Performance evaluation shows proposed model works better to enhance the network lifetime, security, average residual energy, and average packet transmission ratio than conventional data aggregation models.


Sign in / Sign up

Export Citation Format

Share Document