This paper represents a new clustering approach for wireless sensor network. It is a decentralized algorithm having the topology control information in each sensor node. A post leader selection algorithm is acted upon each of the clusters just after their formation. Experimental validation shows that the proposed scheme is an efficient approach for sensor node management.
Congestion causes packet loss which in turn drastically decreases network performance and throughput. As sensors are energy constraint so it is a decisive task to detect congestion and perform congestion control. Additionally, varieties of application have different requirement (i.e. delay, link utilization, and packet loss). In this paper we proposed an application priority based rate control algorithm to mitigate congestion in sensor network. This approach also maintains an interactive queue management scheme so that requirements of different application can be fulfilled. To ensure varieties application priority, concept of intra queue priority and inter queue priority are evolved. Node priority based hop by hop rate adjustment is also proposed here to ensure high link utilization. Finally experimental outputs have demonstrated the effectiveness of this task and show a noticeable performance in terms of energy analysis and throughput of the network.
Abstract-In spite of previous widely held belief of the incompatibility of public key cryptography (PKC) schemes for wireless sensor networks (WSNs), some recent works have shown that, PKC based schemes could be implemented for such networks in some ways. The major challenge of employing a PKC scheme in wireless sensor network is posed by the limitations of resources of the tiny sensors. Considering this feature of the sensors, in this paper, we propose an efficient PKC based security architecture with relatively less resource requirements than those of the other previously proposed PKC schemes for WSN. Our security architecture comprises basically of two parts; a key handshaking scheme based on simple linear operations and the derivation of decryption key by a receiver node. Our architecture allows both base-station-to-node or node-to-base-station secure communications, and node-to-node secure communications. Analysis and simulation results show that, our proposed architecture ensures a good level of security for communications in the network and could effectively be implemented using the limited computation, memory and energy budgets of the current generation sensor nodes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.