An Improved Algorithm Based on LEACH Protocol

Article Preview

Abstract:

In this paper, taking into account the shortcomings of wireless sensor networks, LEACH algorithm, the algorithm has been improved on this basis. The design of the E-LEACH algorithm, which extend the network lifetime, improve node energy utilization, and the effectiveness of this algorithm through simulation experiments.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2725-2727

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li Jianzhong, Gao hong, Advances in wireless sensor network, Computer Research and Development, 2008(01).

Google Scholar

[2] Tang yong, Zhou mingtian , Advances in wireless sensor network routing protocols, Journal of Software, 2006(03).

Google Scholar

[3] Pang Liaojun, Jiao Licheng, Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks, Chinese Journal of Sensors and Actuators, 2008(09).

Google Scholar

[4] LI Ting, FENG Yong, Survey on secure routing research in wireless sensor networks, Application Research of Computers, 2012(12).

Google Scholar

[5] Wang Y. Topology control for wireless sensor networks[J]. Wireless Sensor Networksand Applications, 2008: 113-147.

DOI: 10.1007/978-0-387-49592-7_5

Google Scholar

[6] Akyildiz I, Vuran M. Wireless sensor networks[M]. Wiley Publishing, Inc (2010).

Google Scholar

[7] Bortniko V, Chockler G, Roytman A, et al. Bulletin board: a scalable and robust eventually consistent shared memory over a peer-to-peer overlay[J]. ACM SIGOPS Operating Systems Review, 2010, 44(2): 64-70.

DOI: 10.1145/1773912.1773929

Google Scholar

[8] M. Hamzeh,S. Arab S.M. Fakhraie,C. Lucas. An Improvement on LEACH Algorithm with a Fuzzy Processor . IEICE (2008).

Google Scholar

[9] Wei Bo Hu Han-ying Fu Wen. An Improved LEACH Protocol for Data Bring and Aggregation in wrelss Sensor Networks. IEEE computer society. 2008. 398-401.

DOI: 10.1109/iccee.2008.59

Google Scholar