OPTIMIZING COST AND THROUHPUT EFFICIENCY WITH SECURITY IN WIRELESS AD HOC NETWORKS USING LEACH

被引:0
作者
Menaka, R. [1 ]
Umamaheswari, N. [1 ]
机构
[1] Velammal Engn Coll, Madras 66, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING | 2012年 / 38卷
关键词
wireless networks; ad hoc networks; leach;
D O I
10.1016/j.proeng.2012.06.194
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless ad hoc network (WANET) is a decentralized type of the wireless network. There are various challenges that are faced in the ad hoc environment. Wireless ad hoc networking is the enabling technology for paramount civilian and military applications requiring easy and quick (and often unmanned and cheap) network deployments. The security of communication in ad hoc wireless network is very important especially in military applications. The wireless nature of communication and any lack of network security infrastructure raise several security problems. Asymptotic notations solve the problem of large wireless networks. The main objective of the system is performance degradation of the secure network. In this paper mainly considering, order to reduce delay and increase throughput. The network performance can be calculated by using probability (p<1). Here we implemented LEACH algorithm for an efficient energy saving and thus increases the life time of wireless network. The simulation results show the presented algorithm is more efficient energy saving and fewer packets are damaged; thus provides secure wireless network. (c) 2012 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Noorul Islam Centre for Higher Education
引用
收藏
页码:1586 / 1591
页数:6
相关论文
共 19 条
[11]   The capacity of wireless networks [J].
Gupta, P ;
Kumar, PR .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) :388-404
[12]   Modeling pairwise key establishment for random key predistribution in large-scale sensor networks [J].
Huang, Dijiang ;
Mehta, Manish ;
van de Liefvoort, Appie ;
Medhi, Deep .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (05) :1204-1215
[13]  
Liang Ying, IEEE 6 INT C, P634
[14]  
Liestman Arhtur L., CLUSTERING ALGORITHM
[15]  
Lin X, 3 ANN MED AD HOC NET
[16]   Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility [J].
Lin, Xiaojun ;
Sharma, Gaurav ;
Mazumdar, Ravi R. ;
Shroff, Ness B. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (06) :2777-2784
[17]  
Sharma G., 2006, IEEE C COMPUTER COMM, P1
[18]  
Toumpis S, 2004, IEEE INFOCOM SER, P609
[19]   Securing mobile ad hoc networks with certificateless public keys [J].
Zhang, Yanchao ;
Liu, Wei ;
Lou, Wenjing ;
Fang, Yuguang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) :386-399