A review of Hierarchical energy Protocols in Wireless SensorNetwork
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: This paper attempts to provide an overview of various protocols used in wireless sensor networkwhich include data dissemination and data gathering protocols .Wireless network is any type of computernetwork which uses wireless communication between nodes. Wireless network of autonomous sensors is used tomonitor physical and environmental conditions like pressure, temperature, air pollution, water quality etc. andpass them through the network to the desired location. Each sensor network has several parts – a radiotransceiver with antenna, a microcontroller, an electronic circuit for interfacing with sensors and energy sourcewhich is generally a battery or an embedded form of energy harvesting. Wireless sensor network are havinglimitation of storage space, computing power and energy. Therefore various protocols are used to design energyef icient wireless network. This paper reviews all hierarchical routing protocols .Energy consumption andnetwork lifespan are primary issues considered in this paper.
Authors and Affiliations
Anchal Uniyal, S K Verma
A classification of methods for frequent pattern mining
Abstract: Data mining refers to extracting knowledge from large amounts of data. Frequent pattern mining is aheavily researched area in the field of data mining with wide range of applications. Frequent itemsets is...
Trust Based Secure Payment Scheme for Multi-hop Wireless Networks
In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks.This micro payment scheme enhances the cooperation of nodes and fairness of the network. Each node...
Cloud Computing: Demand and Supply in Banking, Healthcare and Agriculture
Abstract: Right from the Stone Age one law is governing the market for every generation and that well acknowledged law is “Law of Demand & Supply”. ICT is not far away from this law. It is a well-known fact t...
Cryptanalysis of Efficient Unlinkable Secret Handshakes forAnonymous Communications
Abstract: Several unlinkable secret handshakes schemes have been proposed in recent years. As performingthe successful secret handshakes is essentially equivalent to computing a common key between two interactiveme...
Identifiying the Authorised User by Typing Speed Comparison
Abstract: Computers have become a ubiquitous part of the modern society. Online attacks on companies resulted in the shutdown of their networks and compromised the passwords and personal information of millions of users....