logo

Wireless Networks Protocols and Security - Assignment

   

Added on  2022-08-30

12 Pages2482 Words16 Views
Running head: WIRELESS NETWORKS PROTOCOLS AND SECURITY
Wireless Networks protocols and Security
Name of the Student
Name of the University
Authors note

WIRELESS NETWORKS PROTOCOLS AND SECURITY
1
Introduction
Wireless Sensor Network is the emerging technology that are enabled by the collection
of sensor nodes with the limited amount of computing and processing resources available to it.
In most of the cases the WSNs (wireless sensor networks) are distributed in the hostile as well as
unfavorable environment [2]. In the different sections of this paper the features of the two main
protocols (LEACH and PEGASIS), their routing mechanisms, different types of attacks on them
are discussed. Furthermore, the impact and defense mechanisms that can help in securing the
Wireless Sensor Network which is also provided along with the performance evaluation between
the two protocols.
Part A
Routing Mechanism
LEACH
In the wireless sensor networks the LEACH protocols is one of the primitive protocols
that is a single hop protocol when contrasted with non-cluster-based protocol. When the nodes
are conveyed, group of sensors together shapes a cluster and a cluster head known as CH in each
cluster in order to gather data from the other member nodes. The protocol is actualized in
different rounds. Clusters are shaped powerfully and the cluster heads are chosen arbitrarily.
Every node in the cluster has equivalent likelihood to be chosen as CH which expects to adjust
the energy dissipation [1]. The remaining energy is checked continually by the sink until the
lifetime of the round is remained.

WIRELESS NETWORKS PROTOCOLS AND SECURITY
2
After every round, the CH in each cluster changes dependent on the choosing likelihood
which demonstrates that all the nodes in a cluster have similar opportunity in order to be a CH
independent of its remaining energy level. Equally likely CH election process gives rise to the
chance of choosing a CH with minimum amount of remaining energy level which will die out
rapidly when contrasted with the one with relative higher energy level node in the cluster [6].
PEGASIS
In case of PEGASIS protocols, the nodes will be composed with the goal that they
structure a chain inside the network, and the nodes will have need to communicate only with the
nearest neighbors and alternate in speaking with the base station. In fact, PEGASIS has two
primary targets. To start with, expanding the lifetime of every node by utilizing shared
procedures and accordingly enhance the lifetime of the developed chain for data transmission
using the nodes [4]. Also, allowing only the nearby nodes so that the bandwidth consumption in
the communication can be reduced.
While creating a chain with the nodes, the sensor nodes which are already connected in
the chain is not considered further for development of the rest of the chain for transmitting the
data. One node chosen as the leader node inside the network which in turn transmits the
aggregated data to the sink.
Sensor nodes gather information from the last nodes and aggregates it with its own
information and send to the following sensor nodes till it reaches the leader node. The leader
node determination in the chain is random and does not follow any rule [5]. Every node becomes
a leader node utilizing token passing strategy. At the point when any sensor node dies inside the
chain, then the sensor chain is revamped in a similar way by precluding the dead nodes.

WIRELESS NETWORKS PROTOCOLS AND SECURITY
3
Reduced energy consumption
For LEACH protocol it is appropriate when it is important to distribute the energy load
equally among the sensor nodes in the system and reduces the measure of used energy for data
transmission. The activity detail is as per the following. The chain can be figured in a brought
together way by the BS and communicate to all the nodes or be practiced by the sensor nodes
themselves utilizing a voracious calculation [5]. Since this chain calculation is done once, trailed
by numerous rounds of information correspondence, the vitality cost is little contrasted with the
vitality spent in the information assortment stage. The chain developing procedure begins with
the farthest hub from the BS. The nearest neighbor to this hub is the following hub on the chain.
On the other hand, for PEGASIS, it experiences the issue of time delay in transmission
of data. They are in this way not proper for constant applications in the current structure.
Different issues are insatiable chain development system and limit with respect to weight
balance.
Advantages and limitations
Advantages and limitations of LEACH
As the data aggregation is done by only few cluster heads thus leading to energy
efficiency and increasing the lifetime of wireless sensor network.
Limitations
In LEACH, the cluster heads are responsible for directly communicate with bases
stations that leads to increased power consumption for sending data to the BS compared to the
communication among the different cluster heads [3]. In this way the Cluster heads will deplete
its energy within little period of time of operation.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Security in Computing and IT
|12
|2701
|15

PEGASIS Assignment: Part B
|9
|2318
|22

Comparative Study of PEGASIS Protocols
|8
|1360
|13

Computer Networking and Application Research Paper 2022
|11
|2650
|22

Wireless Routing Protocols and Security Analysis
|15
|2815
|21

RF Source Implementation for Communication in Wireless Passive Sensor Network
|25
|8478
|27