An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.However, bandwidth effective sensor node is not effective in improving the energy-saving protocol in wireless sensor network. The wake-up process with high energy consumption leads to maximal overhead count on packet transmission channel. To reduce the energy consumption in wireless sensor network, Energy Efficient Traffic Routing based on the Point Synchronization Fitness Functioning (EETR-PSFF)mechanism is proposed in this paper.At first, Energy Efficient Traffic Routing enables the sensor nodes to sleep for specified durations in an inactive condition in the sensor network to increase the bandwidth utility rate. Next, Active Allocation of the traffic swap slots offers lesser energy consumption on the medium access control channels with heavy loads to increase the overall packet transmission precision accuracy.The final part of our proposed work uses traffic swap slots employedwith Point (i.e.,) node Synchronization Fitness Function which obtain significant energysavings on the wake-up process. PSF function sums up all the coverage values in sensor network and divides it by the product rule. The product rule takes place on the number of sources nodes in the heterogeneous WSN toreduce the energy rate on wake-up process. At the same time the sleep mode in EETR-PSFF mechanism improves the bandwidth efficiently. Experiment is conducted on the factors such as average energy consumptionrate on wake up process, bandwidth utility rate, and overall packet transmission precision accuracy.
Authors and Affiliations
K V Umashankar, , Dr. C. Chanadrasekar
Key Policy Attribute Based Encryption in Cloud Storage
Abstract: Cloud Computing is the rapid growing technology and enables highly scalable services to be easily consumed over the Internet on an as-needed basis. It is a kind of Internet-based computing that provides shared...
A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todeman...
Monitoring Road Accidents using Sensors and providing Medical Facilities
The main objective of this paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need...
Routing Framework for Delay Tolerant Networks using BayesiaLab
Routing in delay tolerant networks (DTN) can benefit from the fact that most real life DTN, especially in the context of people-centric networks (e.g. Pocket Switching Networks (PSN)), exhibit som...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide Information File with an Image
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. There are many application of Steganography with different carrier file format. Here we...