CFP last date
20 January 2025
Reseach Article

Advanced Energy Efficient Routing Strategy based on Election for Wireless Sensor Networ

Published on August 2016 by N. R. Wankhade, D. N. Chaudhari
International Conference on Communication Computing and Virtualization
Foundation of Computer Science USA
ICCCV2016 - Number 2
August 2016
Authors: N. R. Wankhade, D. N. Chaudhari
c9de8011-7fc0-4470-9035-86df60742ebe

N. R. Wankhade, D. N. Chaudhari . Advanced Energy Efficient Routing Strategy based on Election for Wireless Sensor Networ. International Conference on Communication Computing and Virtualization. ICCCV2016, 2 (August 2016), 6-11.

@article{
author = { N. R. Wankhade, D. N. Chaudhari },
title = { Advanced Energy Efficient Routing Strategy based on Election for Wireless Sensor Networ },
journal = { International Conference on Communication Computing and Virtualization },
issue_date = { August 2016 },
volume = { ICCCV2016 },
number = { 2 },
month = { August },
year = { 2016 },
issn = 0975-8887,
pages = { 6-11 },
numpages = 6,
url = { /proceedings/icccv2016/number2/25601-0172/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Computing and Virtualization
%A N. R. Wankhade
%A D. N. Chaudhari
%T Advanced Energy Efficient Routing Strategy based on Election for Wireless Sensor Networ
%J International Conference on Communication Computing and Virtualization
%@ 0975-8887
%V ICCCV2016
%N 2
%P 6-11
%D 2016
%I International Journal of Computer Applications
Abstract

In WSN Sensor node near to the sink will exhaust their limited energy more rapidly than other sensor nodes, since they will have to forward huge data during multi hop transfer to the base station. Therefore network lifetime will be reduced because of hotspot problem. Important research issue is how to cope up with network lifetime. In this paper, a modified Election based Protocol is proposed, the decision of selecting cluster heads by the sink is based on the additional energy and residual energy and geographical location at each node. Besides, the cluster head also selects the shortest path to reach the sink with the use of the congested link. Simulation results show that our approach enhanced the performance than traditional routing algorithms, such as LEACH.

References
  1. Hamid Al-Hamadi and Ing-Ray Chen, "Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks," IEEE Transaction on Network and Service Management, vol. 10, no. 2, June 2013.
  2. O. Younis and S. Fahmy, "HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Trans. Mobile Computing. , vol. 3, no. 4, pp. 366–379, 2004.
  3. E. Felemban, L. et al, "MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks," IEEE Trans. On Mobile Computing. , vol. 5, no. 6, pp. 738–754.
  4. I. R. Chen, et. al, "Adaptive fault-tolerant QoS control algorithms for Maximizing system lifetime of query-based wireless sensor networks," IEEE Trans. Dependable Secure Computing, vol. 8, no. 2, pp. 161–176, 2011.
  5. M. Yarvis, N. Kushalnagar, H. Singh, et al, "Exploiting heterogeneity in sensor networks," In Proc. 2005 IEEE Conf. Computer Communication", vol. 2, pp. 878–890
  6. H. M. Ammari and S. K. Das, "Promoting Heterogeneity, Mobility, and Energy-aware Voronoi diagram in wireless sensor networks," IEEE Trans. Parallel Distributing System", vol. 19, no. 7, pp. 995–1008, 2008.
  7. X. Du and F. Lin, "Improving Routing in Sensor Networks with Heterogeneous sensor nodes," in Proc. 2005 IEEE Veh. Technol. Conf. , pp. 2528–2532.
  8. S. Bo, L. Osborne, X. Yang, and S. Guizani, "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," IEEE Wireless Communication. Mag. , vol. 14, no. 5, pp. 560–563, 2007
  9. I. Krontiris, T. Dimitriou, and F. C. Freiling, "Towards intrusion detection in wireless sensor networks," in Proc. 2007 European Wireless Conf.
  10. J. H. Cho, I. R. Chen, and P. G. Feng, "Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks," IEEE Trans. Reliab. , vol. 59, no. 1, pp. 231–241, 2010
  11. A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proc. 2005 ACM Workshop Quality Service Security Wireless Mobile Net.
  12. Y. Zhou, Y. Fang, et. al. , "Securing wireless sensor networks: a survey," IEEE Communication Surveys & Tutorials", vol. 10, no. 3, pp. 6–28, 2008.
  13. L. Lamport, et. al, "The byzantine generals problem," ACM Trans. Programming Languages Syst. , vol. 4, no. 3, pp. 382–401, 1982
  14. Y. Yang, C. Zhong, Y. Sun, and J. Yang, "Network coding based reliable disjoint and braided multipath routing for sensor networks," J. Netw. Computing Application. , vol. 33, no. 4, pp. 422–432, 2010.
  15. J. Deng, et. al, "INSENS: Intrusion-tolerant Routing for Wireless Sensor networks," Computer Communication". , vol. 29, no. 2, pp. 216–230, 2006
  16. K. D. Kang, K. Liu, and N. Abu-Ghazaleh, "Securing geographic routing in wireless sensor networks," in Proc. 2006
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Multipath Routing Packet Loss Life Time Clustering.