Efficient Cluster Head Selection Strategy With All Pair Shortest Routing In Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Clustering is an effective way for prolonging the lifetime of a wireless sensor network. Clustering in the network consumes much time in organizing the nodes and they hardly consider the energy consumption problem in forming the cluster and in selecting the cluster heads among the other nodes.In this work, an efficient cluster head selection scheme is organized with inculcating the all pair shortest path stratergy which inturn reduce the consumption of energy in the network and increase the life time of the network even in the dynamic network mode. By this formulae, it has been viewed that amont of time taken to send the packet to the destination and the energy consumed by the networks is partially reduced and the network lifetime is improved.
Authors and Affiliations
Mr. Anto Premkumar , Mr. Arnold Joseph , Mr. Kaushik Moses
Detection of Clone Attack in Wsn
Abstract: One of the most vexing problems in wireless sensor network security is the node Clone attack. In thisattack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node b...
Informational Retrieval Using Crawler & Protecting Social Networking Data from Information leakage
Abstract: Online social networks, such as Facebook, Twitter, Yahoo!, Google+ are utilized by many people. These networks allow users to publish details about themselves and to connect to their friends. Some of the...
Image Security With Different Techniques Of Cryptography And Coding: A Survey
Abstract: Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel...
A Survey on Brute Force Attack on Open Functionality Secured
The project entitled as Brute Force Attack On Open Functionality Secured is to design and develop the application package for well secured dynamic application. A common threat web developer’s face is a password-guessing...
A Review onImage Mining Techniques and its application on asoftware BOND
Abstract: Image processing is one of the most researched areas in computer science and it finds numerousapplications in various fields like, medical research and diagnosis, geological research, crime investigation,and so...