TITLE

Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN

AUTHOR(S)
Chitra, M.
PUB. DATE
April 2010
SOURCE
International Journal of Communication Networks & Information Se;Apr2010, Vol. 2 Issue 1, p44
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
A Wireless Sensor Network is composed of hundreds or thousands of nodes that can be equipped with limited energy resources but can still be used over an extensive set of diverse applications such as environment monitoring, healthcare, homeland security, military surveillance, manufacturing, and industry automation. The physical layer parameter affects the performance of the network. In this circumstance, we analyze the best modulation scheme, and transmission approach to minimize the total energy consumption required to send a given number of bits. The total energy consumption includes both the transmission energy and the circuit energy consumption. The modulation schemes are compared based on their energy consumptions at their transmitting node. We consider hop distance estimation for latency analysis. The hop distance estimation used to find the minimum number of hops required to relay a packet from one node to another node in a random network by statistical method. From the minimum number of hops, we have calculated the energy consumption and latency. The statistical model is compared with two other linear models. The result obtained shows that, the statistical method yields a better result for all the performance parameters.
ACCESSION #
49005550

 

Related Articles

  • Analysis and Improvement for SPINS. Yuan Wang; Liang Hu; Jian Feng Chu; Xiao Bo Xu // Journal of Networks;Jan2013, Vol. 8 Issue 1, p229 

    Wireless sensor network is a new application network and with broad application prospects, which is considered as the leader of the top-ten technologies in changing world in future. Recent years, the wireless sensor network receives much attention and application, its security becomes even more...

  • Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks. Poornima, A. S.; Amberker, B. B. // International Journal of Network Security (2152-5064);Jan2010, Vol. 1 Issue 1, p21 

    Hierarchical Sensor Network organization is widely used to achieve energy efficiency in Wireless Sensor Networks (WSN). To achieve security in hierarchical WSN, it is important to be able to encrypt the messages sent between sensor nodes and its cluster head. The key management task is...

  • A New Data Aggregation Scheme to Support Energy Efficiency and Privacy Preservation for Wireless Sensor Networks. Min Yoon; Yong-Ki Kim; Jae-Woo Chang // International Journal of Security & Its Applications;Jan2013, Vol. 7 Issue 1, p129 

    Because a sensor node has limited resources, such as battery capacity, data aggregation techniques have been proposed for wireless sensor networks (WSNs). On the other hand, the provision of efficient data aggregation for preserving data privacy is challenging issue in WSNs. Existing data...

  • A SECURE ENCRYPTION LOGIC FOR COMMUNICATION IN WIRELESS SENSOR NETWORKS. Mandal, Shanta; Chaki, Rituparna // International Journal on Cryptography & Information Security;Sep2012, Vol. 2 Issue 3, p107 

    This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated computational and communication overheads in terms of energy consumption using Directed Diffusion protocol. Public-key cryptography has been observed to suffer from high computational complexity...

  • Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN). Rehman, Sadaqat Ur; Bilal, Muhammad; Ahmad, Basharat; Yahya, Khawaja Muhammad; Ullah, Anees; Rehman, Obaid Ur // International Journal of Computer Science Issues (IJCSI);Jan2012, Vol. 9 Issue 1, p96 

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This...

  • Encrypted Data Comparison and Aggregation for Wireless Sensor Networks. Jianghong Guo; JianFeng Ma // International Journal of Advancements in Computing Technology;Jun2012, Vol. 4 Issue 11, p42 

    Data aggregation is an important method to decrease the energy consumption of wireless sensor networks and privacy protection is another important issue for secure end-end data transmission. In most of existing data aggregation schemes for sensor networks, the encrypted data must be decrypted...

  • An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks. Liehuang Zhu; Zhen Yang; Jingfeng Xue; Cong Guo // International Journal of Distributed Sensor Networks;2014, p1 

    Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. In-network data aggregation is the main solution to minimize energy consumption and maximize network lifetime by reducing communication overhead. However, performing data aggregation...

  • ENCRYPTION AND KEY MANAGEMENT APPROACH WITH IN-NETWORK PROCESSING IN WIRELESS SENSOR NETWORK AND SECURITY ANALYSIS. Rachna, H.; Patel, M. S. // World Journal of Science & Technology;2011, Vol. 1 Issue 12, p46 

    End to end encryption for wireless sensor networks is a challenging problem. To save the overall energy resources of the network it is agreed that sensed data need to be consolidated and aggregated on their way to the final destination. For such circumstances, this dissertation presents an...

  • Well-Organized and Reliably Secure Dynamic Groups of Data Aggregation in Wireless Sensor Networks. Balarengadurai, C. // International Journal of Advanced Research in Computer Science;Jul2011, Vol. 2 Issue 4, p139 

    Wireless sensor networks (WSNs) is an infrastructure comprised of measuring, computing and communication elements that gives an administrator the ability to instrument, observe and react to events. We present a new encryption mode of operation that allows nodes of a network to exchange messages...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics