OPTIMIZING COST AND THROUHPUT EFFICIENCY WITH SECURITY IN WIRELESS AD HOC NETWORKS USING LEACH

被引:0
作者
Menaka, R. [1 ]
Umamaheswari, N. [1 ]
机构
[1] Velammal Engn Coll, Madras 66, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING | 2012年 / 38卷
关键词
wireless networks; ad hoc networks; leach;
D O I
10.1016/j.proeng.2012.06.194
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless ad hoc network (WANET) is a decentralized type of the wireless network. There are various challenges that are faced in the ad hoc environment. Wireless ad hoc networking is the enabling technology for paramount civilian and military applications requiring easy and quick (and often unmanned and cheap) network deployments. The security of communication in ad hoc wireless network is very important especially in military applications. The wireless nature of communication and any lack of network security infrastructure raise several security problems. Asymptotic notations solve the problem of large wireless networks. The main objective of the system is performance degradation of the secure network. In this paper mainly considering, order to reduce delay and increase throughput. The network performance can be calculated by using probability (p<1). Here we implemented LEACH algorithm for an efficient energy saving and thus increases the life time of wireless network. The simulation results show the presented algorithm is more efficient energy saving and fewer packets are damaged; thus provides secure wireless network. (c) 2012 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Noorul Islam Centre for Higher Education
引用
收藏
页码:1586 / 1591
页数:6
相关论文
共 19 条
[1]  
[Anonymous], P 2 IEEE WORKSH MISS
[2]  
Bansal N, 2003, IEEE INFOCOM SER, P1553
[3]  
Bhandari V, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P229
[4]  
Capkun S., IEEE T MOBILE COMPUT, P52
[5]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[6]  
Chiasserini Carla Fabiana, 2002, 2 INT IFIP TC6 NETW, P376
[7]  
Du W., 2003, CCS 03, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[8]   Optimal throughput-delay scaling in wireless networks - Part II: Constant-size packets [J].
El Gamal, Abbas ;
Mammen, James ;
Prabhakar, Balaji ;
Shah, Devavrat .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (11) :5111-5116
[9]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[10]   Closing the gap in the capacity of wireless networks via percolation theory [J].
Franceschetti, Massimo ;
Dousse, Olivier ;
Tse, David N. C. ;
Thiran, Patrick .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (03) :1009-1018