scholarly journals Improved V-Leach Protocol in Wireless Sensor Network with Data Security

2014 ◽  
Vol 9 (5) ◽  
pp. 49-54 ◽  
Author(s):  
Hiral Shah ◽  
◽  
S. R Bhoyar
2014 ◽  
Vol 3 (1) ◽  
pp. 12-16
Author(s):  
Mohit Mungali ◽  
◽  
Rajesh Singh ◽  
Hardwari Lal Mandoria ◽  
◽  
...  

Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 1436-1448
Author(s):  
Jumana Suhail ◽  
Dr. Khalida Sh. Rijab

The paper proposes a methodology for estimating packet flowing at the sensor level in SDN-WSN based on the partial congestion controller with Kalman filter. Furthermore, the actual purpose of proposing such methodology for predicting in advance the subsequent step of packet flow, and that will consequently contribute in reducing the congestion that might happen. The model proposed (SDN with Kalman filter) is optimized using congestion controller, the methodology of proposed work, the first step random distributed of random node, the apply the Kmean cluster of select the head cluster node in, the connected the network based on LEACH protocol. in this work proposed SDN with Kalman filter for control on network and reduce error of data, where achieve by add buffer memory for each nodes and head cluster to store the data, and SDN control on transmit ion data and receiver data, before transmit apply the Kalman filter on data to reduce error data. The proposed technique, according to simulation findings, extends the network's lifetime by over 30% more than typical WSNs, the reduce the average density of memory to 20% than traditional WSN, and the increase the average capacity of memory to 20% than traditional WSN.


2018 ◽  
Vol 7 (2) ◽  
pp. 768
Author(s):  
Muruganandam. A ◽  
Anitha. R

A Wireless Sensor Network (WSNs) is popular developing the field in industrial and other major markets. Wireless data security is the central theme in the WSNs application where security of transmitted data is more concerned. Due to the significant concentration of energy efficiency and performance analysis in WSN, providing secured communication is a challenging issue. To overcome this interdependent problem Game theory can be used. Game theory is applied here to select different routes to transfer the data from source to destination. The performance of the WSNs can be increased by providing security for transmitted data. The graph for throughput, end to end delay, delivery, and packet loss ratio are generated using NS2 simulation tool.


Sign in / Sign up

Export Citation Format

Share Document