2021
DOI: 10.1002/dac.4881
|View full text |Cite
|
Sign up to set email alerts
|

ETH‐LEACH: An energy enhanced threshold routing protocol for WSNs

Abstract: Many wireless sensor-based applications use LEACH as a preferred routing protocol owing to its unique features such as optimal sleeping time, minimum packet collisions, dynamic channel selection, and least power consumption. The traditional LEACH protocol wastes the transmission opportunities as it processes data only in an event occurring, leading to wastage of resources. To resolve this issue, this paper proposes a more robust Energy Enhanced Threshold Routing Protocol (ETH-LEACH) for WSNs. The working of ET… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 45 publications
(48 reference statements)
0
18
0
Order By: Relevance
“…In Reference 17, the adaptive ranking and threshold approach are taken into account for evading the wastage of resources, hidden terminal problems, extending the lifetime, and optimizing sleeping time. Time‐division multiple access mechanisms are exploited in the suggested work to reduce the packet collision.…”
Section: Related Workmentioning
confidence: 99%
“…In Reference 17, the adaptive ranking and threshold approach are taken into account for evading the wastage of resources, hidden terminal problems, extending the lifetime, and optimizing sleeping time. Time‐division multiple access mechanisms are exploited in the suggested work to reduce the packet collision.…”
Section: Related Workmentioning
confidence: 99%
“…The sensors sense the data and forward it to the destination [9]. A WSN is mostly used in military wars, education, healthcare, etc.…”
Section: Related Workmentioning
confidence: 99%
“…The data packets are not being forwarded to the destination and are dropped on their way to the destination due to the malicious nodes. Therefore, to resolve the above-mentioned security issues, the authors propose a central management routing protocol in which the intermediary node acts as a gateway and third party [9]. However, central authority or third party does not provide a fair secure model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wireless sensor networks (WSNs) have evolved rapidly in recent years, and have become one of the critical areas for research in network applications [1]. Their low cost and ease of deployment have enabled them to be used in various smart sensor devices in our lives, such as in-vehicle communications, smart homes, and remote monitoring.…”
Section: Introductionmentioning
confidence: 99%