SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 4 ǁ April. 2014 ǁ PP.26-30
www.ijres.org 26 | Page
Power Aware Cluster to Minimize Load In Mobile Ad Hoc
Networks
Anitha.K.M 1
, Shobana. S2
, Aileen Chris. P3
1
(Final year ME(CSE) Student, Karpagam University, TamilNadu, India.)
2
(Final year ME(CSE) Student, Karpagam University, TamilNadu, India.)
3
(Asst. Professor, Department of CSE, Karpagam University, TamilNadu, India.)
ABSTRACT : Mobile ad hoc networks (MANETs) are popularly known to their mobility and ease of usage.
These networks are a set of identical nodes that move freely to communicate among networks and they are
represented as a set of clusters. However, their wireless and active natures cause them to be more susceptible to
various types of security attacks and transmission energy consumption so that they drop out of the network
easily. Now-a-days the major challenge of MANETS is to endow with the assurance to the secure network
services and also to provide a nearby balance of load for the cluster-heads. To meet this confront, certificate
revocation with load balancing is an important central component to provide security and energy conservation
in the network communications. In this paper, we focus on load balancing clustering to widen the lifetime of the
cluster-head for a maximum time before allowing it to withdraw so as to distribute the responsibility to other
legitimate nodes in the cluster to act as a cluster-head along with the issue of certificate revocation process. For
quick, accurate, secure certificate revocation and to conserve energy, we propose the CCRV with Load
Balancing Clustering scheme where we can reduce the burden of the cluster along with secure certificate
revocation. In particular, to minimize the transmission energy consumption, we use the master slave model to
operate the network with longer lifetime and we propose load balancing mechanism to enhance the lifetime of
the cluster-head.
Keywords- Certificate Revocation, Load Balancing, Master-Slave, Mobile Ad hoc Networks (MANETs).
I. INTRODUCTION
Mobile ad hoc networks have received a great scope in recent years due to their dynamic topology,
self-configuring and infrastructure-less network. The major issue addressed when discussing about MANET is
the security and the energy consumption. Since energy consumption reduces the wireless networks’ connection
lifetime, this issue has to be taken into account with utmost care. Most of the previous work in the literature
focuses on clustering nodes for routing purpose and also address on energy efficiency. Clustering MANET
nodes has perceptible advantages with respect to overall network management.
Fig 1. Node Clustering
Due to the mobility nature of the mobile ad hoc networks, these are powered by batteries.
Communications or transmissions in the network cause the batteries to worn-out. Therefore, the amount of
communications should be minimized to avoid a node in dropping out of the network. Cluster-head batteries can
worn-out faster because they are involved in every communication within their cluster. Therefore, there is a
need to allocate the responsibility of being a cluster-head to all nodes (load-balancing). In the case of periodic
certificate revocation and monitoring of a malicious node, extra care is needed for the cluster-heads. The
proposed scheme provides load balancing among cluster-heads while they are in the process of certificate
Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks
www.ijres.org 27 | Page
revocation to assure a evenhanded distribution of load among cluster-heads and to safeguard them by
minimizing their energy consumption.
In this paper, we propose a certificate revocation with load balancing scheme which takes into account
of reducing the transmission energy consumption. The performance of the proposed scheme is evaluated in
terms of both certificate revocation and balance of load in electing the cluster-head to minimize its burden. The
reminder of the paper is structured as follows. In Section II, existing certificate revocation methods are
reviewed, and their advantages and drawbacks are briefly described. Section III presents the detailed mechanism
of our proposed load balancing scheme. The experimental analysis of the proposed scheme is evaluated and
analyzed in Section IV, and Section V concludes the paper.
Fig 2. Cluster Structure.
II. RELATED WORK
Various kinds of load balancing schemes had been addressed earlier but without certificate revocation
technique. On the other hand, numerous certificate revocation techniques have been proposed to enhance
network security but balancing the load of a cluster and conserving the energy is still a challenging task.
In this section, we briefly review numerous methods that have been used for certificate revocation and
various clustering schemes and present an idea of how we can conserve the energy by reducing the cluster-
head’s burden thereby enhancing the lifetime of the cluster-head. In URSA [3], they used a voting based
mechanism in which the certificates of any node that joins the network, is issued by the neighboring nodes in
that network. Two neighboring nodes receive their certificates from each other and also exchange certificate
information about other nodes that they know. Nodes that shares the same certificate information belongs to the
same network. When the number of accusations against the node exceeds a certain threshold, the certificate of a
suspected node is revoked. Since URSA communicates among their neighbors, they do not require any special
equipment such as Certificate Authorities (CA). So this leads to high operational cost and the major issue of
false accusation has not been addressed.
Another scheme proposed for the certificate revocation [4], also uses the voting based mechanism
where all the nodes in the network are allowed to vote together. In URSA, no Certification Authority (CA)
exists in the network, instead each node monitors the behavior of its neighboring nodes. The primary difference
from URSA is that nodes vote with variable weights. The load of a node is considered in terms of the reliability
and trustworthiness of the node that is derived from its past behaviors in the network. When the weighted sum
from voters against the node exceeds a predefined threshold, the certificate of an accused node is revoked. By
doing so, the accuracy of certificate revocation can be improved. However, since participation of all nodes in
each voting takes place in this scheme, the communications overhead used to exchange voting information
is relatively high, and it enhances the revocation time also.
The method proposed in [4] introduces a time session to refresh the certificate information of each
node. The accusation count is reset at the end of each session. Therefore, while this scheme is able to mitigate
the damage caused by false accusations, the performance can be largely degraded by the increase of malicious
nodes.
The objective of the DS-based clustering schemes is it forms an inter-cluster routing backbone in a
network by selecting a small number of mobile nodes as dominating nodes to form the DS. Both schemes form
1-hop clusters with dominating nodes serving as cluster-heads. Chen’s algorithm[7] can form smaller number of
clusters, that results in a lesser amount of cluster overlap architecture by relaxing the direct connection
requirement between dominating nodes when compared with Wu’s algorithm[6]. DS-based clustering is more
feasible for static networks or networks with low mobility. Wu’s algorithm could be completed in just two
rounds while Chen’s needs a larger and non-constant number of rounds.
In Low-Maintenance Clustering, LCC[8], 3hBAC[9], and Lin’s[10] algorithm are considered to be
active clustering schemes, as they require precise cluster- related control message exchange among nodes. Also,
Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks
www.ijres.org 28 | Page
they need stationary motion period of the mobile nodes for the initial cluster construction because their cluster-
heads are required to bear a specific characteristic, i.e. highest connectivity, in their local area. These schemes
need a non-constant number of rounds to complete the cluster formation since not all the cluster-head claims can
be declared at the same time, because some mobile nodes can serve as cluster-heads only after they can confirm
some neighbors’ status.
According to the above discussion, all the security based research works concentrate mainly on
recovering the falsely accused node which is very essential for a secure communication but did not address the
lifetime of the cluster-head which plays a vital role in revocation process with other nodes in the network.
Various energy-efficiency based research works did not address the certificate revocation process. In this paper,
we propose a load balancing clustering scheme which can achieve reduced transmission power along with the
certificate revocation process with prompt revocation, lower operational traffic, and mitigate damage from false
accusations.
III. THE ENVISIONED SCHEME
We are combining CCRV with Load balancing clustering (LBC) provide a nearby balance of load on
the elected cluster-heads.
3.1. Load Balancing Clustering
In Load Balancing Clustering [11], once a node is elected a cluster-head it stays as a cluster-head up to
some maximum specified amount of time. Each mobile node has a variable, virtual ID (VID), and the value of
VID is set as its ID number at first. Primarily, the nodes with the highest IDs in their local area win the cluster-
head role. Fig 3 shows a sample load balancing clustering. When a cluster-head exhausts its duration time, it
resets its VID to 0 and becomes a non-cluster-head node and shares the information in the warning list and black
list to the newly elected cluster-head which is not a malicious node. When two cluster-heads move into same
transmission range, the one with higher VID is elected as a cluster-head. A cluster-head must possess both
characteristics: highest ID and normal node or legitimate node. When a cluster-head quits, a non-cluster-head
with the largest VID value and also acting as a normal node in the neighbourhood can continue the cluster-head
function. The newly chosen mobile node is the one whose previous total cluster-head serving time is the shortest
in its neighbourhood, and this should guarantee good energy level for being a new cluster-head.
Fig 3: Sample Load Balancing Clustering.
3.2. Energy conservation in clustering
To achieve energy conservation in clustering [12], two node types: master and slave are used. The
master nodes are the cluster-heads and the slave nodes are the cluster members. A slave node must be connected
to only one master node, and it is not allowed to have a direct connection between slave nodes. Master nodes are
selected in advance, and can only serve a limited number of slave nodes. To minimize the transmission energy
consumption summed by all master slave pairs and to serve as many slave nodes as possible in order to operate
the network with longer lifetime and better performance. The channel allocation procedure also follows the
received signal strength. The drawback of this scheme is paging process before each round of communication
consumes a large amount of energy. The scheme can be executed with less computing power at high speed using
the single-phased scheme.
IV. EXPERIMENTAL ANALYSIS
Our simulated network consists of 20, 30 and 40 mobile nodes in an area of 10 by 10 m2
. The nodes are
separated in the network in different locations. The mobile nodes then start separating themselves and forms into
clusters. There should be atleast three CMs under each CHs to communicate with them. The CMs starts sending
the packets through the CHs to a particular destination. If the CH suffers from heavy load then the packets are
sent to the destination through the CMs and they choose a CM to act as a CH. Each mobile node is uniformly
Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks
www.ijres.org 29 | Page
randomly distributed in the simulation area. Fig 4 and 5 shows the end-to-end latency and the packet delivery
ratio of the proposed scheme.
Fig 4. End-to-End Latency
Fig 5. Packet Delivery Ratio
V. CONCLUSION
We have presented the CCRV with load balancing scheme, an effective and efficient mechanism to
reduce the call drop rate by giving priority to the slave nodes that receive single paging signal in the channel
allocation. We have combined the load balancing scheme with certificate revocation mechanism in order to
reduce the transmission power where the cluster-heads play a vital role in the process of revoking the certificate
of the attacker node. The proposed schemes can be implemented and executed in real time. The transmission
power and the packet delivery rate for the proposed schemes produces approximate optimum results. Hence, the
proposed schemes are suitable for periodic or event-driven cluster reconfiguration. The optimization problems
were formulated as signomial optimizations and linear optimization, which were efficiently solved using
generalized geometric programming and linear programming, respectively. For tractability purposes, the
analysis for the stochastic model is necessarily approximate, as it relies on several simplifying assumptions.
Simulations were conducted to verify the adequacy of this analysis and demonstrate the substantial benefits of
the proposed schemes in terms of prolonging the coverage time of the network.
REFERENCES
[1] K. Park, H. Nishiyama, N. Ansari, and N. Kato, “Certificate revocation to cope with false accusations in mobile ad hoc
networks,” Proc. 2010 IEEE 71st Vehicular Technology Conference: VTC2010-Spring, Taipei,Taiwan, May 16-19, 2010.
[2] J. Clulow and T. Moore, “Suicide for the Common Good: A New Strategy for Credential Revocation in Selforganizing Systems,”
ACMSIGOPS Operating Systems Reviews, vol. 40, no. 3, pp.18-21, Jul.2006.
[3] H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: ubiquitous and robust access control for mobile adhoc networks,”
IEEE/ACM Trans. Networking, vol. 12, no. 6, pp.1049-1063, Oct. 2004.
[4] G. Arboit, C. Crepeau, C. R. Davis, and Maheswaran, “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks,”
Ad Hoc Network, vol. 6, no. 1, pp. 17-31, Jan. 2008.
[5] S. Bandyopadhyay, and E. J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks,” in Proc.
IEEE INFOCOM 2003, Apr. 2003.
[6] J. Wu and H. L. Li, “On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks,” Proc. 3rd
Int’l. Wksp. Discrete Algorithms and Methods for Mobile Comp. and Commun., 1999, pp. 7–14.
Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks
www.ijres.org 30 | Page
[7] Y.-Z. P. Chen and A. L. Liestman, “Approximating Minimum Size Weakly-Connected Dominating Sets for Clustering Mobile Ad
Hoc Networks,” in Proc. 3rd ACM Int’l. Symp. Mobile Ad Hoc Net. & Comp., June 2002, pp. 165–72.
[8] C.-C. Chiang et al., “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,” in Proc. IEEE SICON’97,
1997.
[9] J. Y. Yu and P. H. J. Chong, “3hBAC (3-hop between Adjacent Clusterheads): a Novel Non-overlapping Clustering Algorithm for
Mobile Ad Hoc Networks,” in Proc. IEEE Pacrim’03, vol. 1, Aug. 2003, pp. 318–21.
[10] C. R. Lin and M. Gerla, “Adaptive Clustering for Mobile Wireless Networks,” IEEE JSAC, vol. 15, Sept. 1997, pp. 1265–75.
[11] A. D. Amis and R. Prakash, “Load-Balancing Clusters in Wireless Ad Hoc Networks,” in Proc. 3rd IEEE ASSET’00, Mar. 2000,
pp. 25–32.
[12] J.-H. Ryu, S. Song, and D.-H. Cho, “New Clustering Schemes for Energy Conservation in Two-Tiered Mobile Ad-Hoc Networks,”
in Proc. IEEE ICC’01, vo1. 3, June 2001, pp. 862–66.

More Related Content

What's hot

Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
 
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEPERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEijasuc
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKcscpconf
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network IJECEIAES
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols forAlexander Decker
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 

What's hot (20)

Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 
Ttacca
TtaccaTtacca
Ttacca
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEPERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysis
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
 
B0781013215
B0781013215B0781013215
B0781013215
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 

Viewers also liked

Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...
Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...
Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...IJRES Journal
 
Estimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SA
Estimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SAEstimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SA
Estimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SAIJRES Journal
 
Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...
Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...
Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...IJRES Journal
 
A Review of Engineering Geology in Tanzania
A Review of Engineering Geology in TanzaniaA Review of Engineering Geology in Tanzania
A Review of Engineering Geology in TanzaniaIJRES Journal
 
A Revisit To Forchheimer Equation Applied In Porous Media Flow
A Revisit To Forchheimer Equation Applied In Porous Media FlowA Revisit To Forchheimer Equation Applied In Porous Media Flow
A Revisit To Forchheimer Equation Applied In Porous Media FlowIJRES Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...IJRES Journal
 
Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...
Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...
Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...IJRES Journal
 
Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...
Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...
Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...IJRES Journal
 
A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...
A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...
A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...IJRES Journal
 
Finite Element Simulation of Serrated Chip Formation in High Speed Cutting
Finite Element Simulation of Serrated Chip Formation in High Speed CuttingFinite Element Simulation of Serrated Chip Formation in High Speed Cutting
Finite Element Simulation of Serrated Chip Formation in High Speed CuttingIJRES Journal
 
Supercritical Evaporation of a Drop
Supercritical Evaporation of a DropSupercritical Evaporation of a Drop
Supercritical Evaporation of a DropIJRES Journal
 
Vehicle Recognition at Night Based on Tail LightDetection Using Image Processing
Vehicle Recognition at Night Based on Tail LightDetection Using Image ProcessingVehicle Recognition at Night Based on Tail LightDetection Using Image Processing
Vehicle Recognition at Night Based on Tail LightDetection Using Image ProcessingIJRES Journal
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
 
Transparent Electronics
Transparent ElectronicsTransparent Electronics
Transparent ElectronicsIJRES Journal
 
A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...
A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...
A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...IJRES Journal
 
Role Of Private Sector Banks In Financial Inclusion: A Case Study On West-Bengal
Role Of Private Sector Banks In Financial Inclusion: A Case Study On West-BengalRole Of Private Sector Banks In Financial Inclusion: A Case Study On West-Bengal
Role Of Private Sector Banks In Financial Inclusion: A Case Study On West-BengalIJRES Journal
 
Operational Research and Organizational System
Operational Research and Organizational SystemOperational Research and Organizational System
Operational Research and Organizational SystemIJRES Journal
 
Design and performance of Four-Stage Adsorption System
Design and performance of Four-Stage Adsorption SystemDesign and performance of Four-Stage Adsorption System
Design and performance of Four-Stage Adsorption SystemIJRES Journal
 

Viewers also liked (19)

Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...
Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...
Quantum-inspired artificial fish swarm algorithm based on the Bloch sphere se...
 
Estimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SA
Estimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SAEstimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SA
Estimation Of Optimum Dilution In The GMAW Process Using Integrated ANN-SA
 
Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...
Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...
Photoinduced Grafting of Methyl Methacrylate onto Dehydrochlorinated poly (Vi...
 
A Review of Engineering Geology in Tanzania
A Review of Engineering Geology in TanzaniaA Review of Engineering Geology in Tanzania
A Review of Engineering Geology in Tanzania
 
A Revisit To Forchheimer Equation Applied In Porous Media Flow
A Revisit To Forchheimer Equation Applied In Porous Media FlowA Revisit To Forchheimer Equation Applied In Porous Media Flow
A Revisit To Forchheimer Equation Applied In Porous Media Flow
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
 
Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...
Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...
Analysis Of 3C-Sic Double Implanted MOSFET With Gaussian Profile Doping In Th...
 
Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...
Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...
Role of Natural and Synthetic Fillers on Erosive Wear Behavior of Basalt -Epo...
 
A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...
A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...
A Mathematical Model for the Hormonal Responses During Neurally Mediated Sync...
 
Finite Element Simulation of Serrated Chip Formation in High Speed Cutting
Finite Element Simulation of Serrated Chip Formation in High Speed CuttingFinite Element Simulation of Serrated Chip Formation in High Speed Cutting
Finite Element Simulation of Serrated Chip Formation in High Speed Cutting
 
Supercritical Evaporation of a Drop
Supercritical Evaporation of a DropSupercritical Evaporation of a Drop
Supercritical Evaporation of a Drop
 
Vehicle Recognition at Night Based on Tail LightDetection Using Image Processing
Vehicle Recognition at Night Based on Tail LightDetection Using Image ProcessingVehicle Recognition at Night Based on Tail LightDetection Using Image Processing
Vehicle Recognition at Night Based on Tail LightDetection Using Image Processing
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
Transparent Electronics
Transparent ElectronicsTransparent Electronics
Transparent Electronics
 
A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...
A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...
A Simple Control Strategy for Boost Converter Based Wind and Solar Hybrid Ene...
 
Role Of Private Sector Banks In Financial Inclusion: A Case Study On West-Bengal
Role Of Private Sector Banks In Financial Inclusion: A Case Study On West-BengalRole Of Private Sector Banks In Financial Inclusion: A Case Study On West-Bengal
Role Of Private Sector Banks In Financial Inclusion: A Case Study On West-Bengal
 
Operational Research and Organizational System
Operational Research and Organizational SystemOperational Research and Organizational System
Operational Research and Organizational System
 
Design and performance of Four-Stage Adsorption System
Design and performance of Four-Stage Adsorption SystemDesign and performance of Four-Stage Adsorption System
Design and performance of Four-Stage Adsorption System
 

Similar to Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks

Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperEditor IJCATR
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Modified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsnsModified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsnsijujournal
 
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNSMODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNSijujournal
 
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNSMODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNSijujournal
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...1crore projects
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 
Energy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-cEnergy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-cijwmn
 

Similar to Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks (20)

Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review Paper
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Modified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsnsModified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsns
 
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNSMODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
 
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNSMODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
MODIFIED CCEF FOR ENERGY-EFFICIENCY AND EXTENDED NETWORK LIFETIME IN WSNS
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
Energy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-cEnergy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-c
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 4 ǁ April. 2014 ǁ PP.26-30 www.ijres.org 26 | Page Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks Anitha.K.M 1 , Shobana. S2 , Aileen Chris. P3 1 (Final year ME(CSE) Student, Karpagam University, TamilNadu, India.) 2 (Final year ME(CSE) Student, Karpagam University, TamilNadu, India.) 3 (Asst. Professor, Department of CSE, Karpagam University, TamilNadu, India.) ABSTRACT : Mobile ad hoc networks (MANETs) are popularly known to their mobility and ease of usage. These networks are a set of identical nodes that move freely to communicate among networks and they are represented as a set of clusters. However, their wireless and active natures cause them to be more susceptible to various types of security attacks and transmission energy consumption so that they drop out of the network easily. Now-a-days the major challenge of MANETS is to endow with the assurance to the secure network services and also to provide a nearby balance of load for the cluster-heads. To meet this confront, certificate revocation with load balancing is an important central component to provide security and energy conservation in the network communications. In this paper, we focus on load balancing clustering to widen the lifetime of the cluster-head for a maximum time before allowing it to withdraw so as to distribute the responsibility to other legitimate nodes in the cluster to act as a cluster-head along with the issue of certificate revocation process. For quick, accurate, secure certificate revocation and to conserve energy, we propose the CCRV with Load Balancing Clustering scheme where we can reduce the burden of the cluster along with secure certificate revocation. In particular, to minimize the transmission energy consumption, we use the master slave model to operate the network with longer lifetime and we propose load balancing mechanism to enhance the lifetime of the cluster-head. Keywords- Certificate Revocation, Load Balancing, Master-Slave, Mobile Ad hoc Networks (MANETs). I. INTRODUCTION Mobile ad hoc networks have received a great scope in recent years due to their dynamic topology, self-configuring and infrastructure-less network. The major issue addressed when discussing about MANET is the security and the energy consumption. Since energy consumption reduces the wireless networks’ connection lifetime, this issue has to be taken into account with utmost care. Most of the previous work in the literature focuses on clustering nodes for routing purpose and also address on energy efficiency. Clustering MANET nodes has perceptible advantages with respect to overall network management. Fig 1. Node Clustering Due to the mobility nature of the mobile ad hoc networks, these are powered by batteries. Communications or transmissions in the network cause the batteries to worn-out. Therefore, the amount of communications should be minimized to avoid a node in dropping out of the network. Cluster-head batteries can worn-out faster because they are involved in every communication within their cluster. Therefore, there is a need to allocate the responsibility of being a cluster-head to all nodes (load-balancing). In the case of periodic certificate revocation and monitoring of a malicious node, extra care is needed for the cluster-heads. The proposed scheme provides load balancing among cluster-heads while they are in the process of certificate
  • 2. Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks www.ijres.org 27 | Page revocation to assure a evenhanded distribution of load among cluster-heads and to safeguard them by minimizing their energy consumption. In this paper, we propose a certificate revocation with load balancing scheme which takes into account of reducing the transmission energy consumption. The performance of the proposed scheme is evaluated in terms of both certificate revocation and balance of load in electing the cluster-head to minimize its burden. The reminder of the paper is structured as follows. In Section II, existing certificate revocation methods are reviewed, and their advantages and drawbacks are briefly described. Section III presents the detailed mechanism of our proposed load balancing scheme. The experimental analysis of the proposed scheme is evaluated and analyzed in Section IV, and Section V concludes the paper. Fig 2. Cluster Structure. II. RELATED WORK Various kinds of load balancing schemes had been addressed earlier but without certificate revocation technique. On the other hand, numerous certificate revocation techniques have been proposed to enhance network security but balancing the load of a cluster and conserving the energy is still a challenging task. In this section, we briefly review numerous methods that have been used for certificate revocation and various clustering schemes and present an idea of how we can conserve the energy by reducing the cluster- head’s burden thereby enhancing the lifetime of the cluster-head. In URSA [3], they used a voting based mechanism in which the certificates of any node that joins the network, is issued by the neighboring nodes in that network. Two neighboring nodes receive their certificates from each other and also exchange certificate information about other nodes that they know. Nodes that shares the same certificate information belongs to the same network. When the number of accusations against the node exceeds a certain threshold, the certificate of a suspected node is revoked. Since URSA communicates among their neighbors, they do not require any special equipment such as Certificate Authorities (CA). So this leads to high operational cost and the major issue of false accusation has not been addressed. Another scheme proposed for the certificate revocation [4], also uses the voting based mechanism where all the nodes in the network are allowed to vote together. In URSA, no Certification Authority (CA) exists in the network, instead each node monitors the behavior of its neighboring nodes. The primary difference from URSA is that nodes vote with variable weights. The load of a node is considered in terms of the reliability and trustworthiness of the node that is derived from its past behaviors in the network. When the weighted sum from voters against the node exceeds a predefined threshold, the certificate of an accused node is revoked. By doing so, the accuracy of certificate revocation can be improved. However, since participation of all nodes in each voting takes place in this scheme, the communications overhead used to exchange voting information is relatively high, and it enhances the revocation time also. The method proposed in [4] introduces a time session to refresh the certificate information of each node. The accusation count is reset at the end of each session. Therefore, while this scheme is able to mitigate the damage caused by false accusations, the performance can be largely degraded by the increase of malicious nodes. The objective of the DS-based clustering schemes is it forms an inter-cluster routing backbone in a network by selecting a small number of mobile nodes as dominating nodes to form the DS. Both schemes form 1-hop clusters with dominating nodes serving as cluster-heads. Chen’s algorithm[7] can form smaller number of clusters, that results in a lesser amount of cluster overlap architecture by relaxing the direct connection requirement between dominating nodes when compared with Wu’s algorithm[6]. DS-based clustering is more feasible for static networks or networks with low mobility. Wu’s algorithm could be completed in just two rounds while Chen’s needs a larger and non-constant number of rounds. In Low-Maintenance Clustering, LCC[8], 3hBAC[9], and Lin’s[10] algorithm are considered to be active clustering schemes, as they require precise cluster- related control message exchange among nodes. Also,
  • 3. Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks www.ijres.org 28 | Page they need stationary motion period of the mobile nodes for the initial cluster construction because their cluster- heads are required to bear a specific characteristic, i.e. highest connectivity, in their local area. These schemes need a non-constant number of rounds to complete the cluster formation since not all the cluster-head claims can be declared at the same time, because some mobile nodes can serve as cluster-heads only after they can confirm some neighbors’ status. According to the above discussion, all the security based research works concentrate mainly on recovering the falsely accused node which is very essential for a secure communication but did not address the lifetime of the cluster-head which plays a vital role in revocation process with other nodes in the network. Various energy-efficiency based research works did not address the certificate revocation process. In this paper, we propose a load balancing clustering scheme which can achieve reduced transmission power along with the certificate revocation process with prompt revocation, lower operational traffic, and mitigate damage from false accusations. III. THE ENVISIONED SCHEME We are combining CCRV with Load balancing clustering (LBC) provide a nearby balance of load on the elected cluster-heads. 3.1. Load Balancing Clustering In Load Balancing Clustering [11], once a node is elected a cluster-head it stays as a cluster-head up to some maximum specified amount of time. Each mobile node has a variable, virtual ID (VID), and the value of VID is set as its ID number at first. Primarily, the nodes with the highest IDs in their local area win the cluster- head role. Fig 3 shows a sample load balancing clustering. When a cluster-head exhausts its duration time, it resets its VID to 0 and becomes a non-cluster-head node and shares the information in the warning list and black list to the newly elected cluster-head which is not a malicious node. When two cluster-heads move into same transmission range, the one with higher VID is elected as a cluster-head. A cluster-head must possess both characteristics: highest ID and normal node or legitimate node. When a cluster-head quits, a non-cluster-head with the largest VID value and also acting as a normal node in the neighbourhood can continue the cluster-head function. The newly chosen mobile node is the one whose previous total cluster-head serving time is the shortest in its neighbourhood, and this should guarantee good energy level for being a new cluster-head. Fig 3: Sample Load Balancing Clustering. 3.2. Energy conservation in clustering To achieve energy conservation in clustering [12], two node types: master and slave are used. The master nodes are the cluster-heads and the slave nodes are the cluster members. A slave node must be connected to only one master node, and it is not allowed to have a direct connection between slave nodes. Master nodes are selected in advance, and can only serve a limited number of slave nodes. To minimize the transmission energy consumption summed by all master slave pairs and to serve as many slave nodes as possible in order to operate the network with longer lifetime and better performance. The channel allocation procedure also follows the received signal strength. The drawback of this scheme is paging process before each round of communication consumes a large amount of energy. The scheme can be executed with less computing power at high speed using the single-phased scheme. IV. EXPERIMENTAL ANALYSIS Our simulated network consists of 20, 30 and 40 mobile nodes in an area of 10 by 10 m2 . The nodes are separated in the network in different locations. The mobile nodes then start separating themselves and forms into clusters. There should be atleast three CMs under each CHs to communicate with them. The CMs starts sending the packets through the CHs to a particular destination. If the CH suffers from heavy load then the packets are sent to the destination through the CMs and they choose a CM to act as a CH. Each mobile node is uniformly
  • 4. Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks www.ijres.org 29 | Page randomly distributed in the simulation area. Fig 4 and 5 shows the end-to-end latency and the packet delivery ratio of the proposed scheme. Fig 4. End-to-End Latency Fig 5. Packet Delivery Ratio V. CONCLUSION We have presented the CCRV with load balancing scheme, an effective and efficient mechanism to reduce the call drop rate by giving priority to the slave nodes that receive single paging signal in the channel allocation. We have combined the load balancing scheme with certificate revocation mechanism in order to reduce the transmission power where the cluster-heads play a vital role in the process of revoking the certificate of the attacker node. The proposed schemes can be implemented and executed in real time. The transmission power and the packet delivery rate for the proposed schemes produces approximate optimum results. Hence, the proposed schemes are suitable for periodic or event-driven cluster reconfiguration. The optimization problems were formulated as signomial optimizations and linear optimization, which were efficiently solved using generalized geometric programming and linear programming, respectively. For tractability purposes, the analysis for the stochastic model is necessarily approximate, as it relies on several simplifying assumptions. Simulations were conducted to verify the adequacy of this analysis and demonstrate the substantial benefits of the proposed schemes in terms of prolonging the coverage time of the network. REFERENCES [1] K. Park, H. Nishiyama, N. Ansari, and N. Kato, “Certificate revocation to cope with false accusations in mobile ad hoc networks,” Proc. 2010 IEEE 71st Vehicular Technology Conference: VTC2010-Spring, Taipei,Taiwan, May 16-19, 2010. [2] J. Clulow and T. Moore, “Suicide for the Common Good: A New Strategy for Credential Revocation in Selforganizing Systems,” ACMSIGOPS Operating Systems Reviews, vol. 40, no. 3, pp.18-21, Jul.2006. [3] H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: ubiquitous and robust access control for mobile adhoc networks,” IEEE/ACM Trans. Networking, vol. 12, no. 6, pp.1049-1063, Oct. 2004. [4] G. Arboit, C. Crepeau, C. R. Davis, and Maheswaran, “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks,” Ad Hoc Network, vol. 6, no. 1, pp. 17-31, Jan. 2008. [5] S. Bandyopadhyay, and E. J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks,” in Proc. IEEE INFOCOM 2003, Apr. 2003. [6] J. Wu and H. L. Li, “On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks,” Proc. 3rd Int’l. Wksp. Discrete Algorithms and Methods for Mobile Comp. and Commun., 1999, pp. 7–14.
  • 5. Power Aware Cluster To Minimize Load In Mobile Ad Hoc Networks www.ijres.org 30 | Page [7] Y.-Z. P. Chen and A. L. Liestman, “Approximating Minimum Size Weakly-Connected Dominating Sets for Clustering Mobile Ad Hoc Networks,” in Proc. 3rd ACM Int’l. Symp. Mobile Ad Hoc Net. & Comp., June 2002, pp. 165–72. [8] C.-C. Chiang et al., “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,” in Proc. IEEE SICON’97, 1997. [9] J. Y. Yu and P. H. J. Chong, “3hBAC (3-hop between Adjacent Clusterheads): a Novel Non-overlapping Clustering Algorithm for Mobile Ad Hoc Networks,” in Proc. IEEE Pacrim’03, vol. 1, Aug. 2003, pp. 318–21. [10] C. R. Lin and M. Gerla, “Adaptive Clustering for Mobile Wireless Networks,” IEEE JSAC, vol. 15, Sept. 1997, pp. 1265–75. [11] A. D. Amis and R. Prakash, “Load-Balancing Clusters in Wireless Ad Hoc Networks,” in Proc. 3rd IEEE ASSET’00, Mar. 2000, pp. 25–32. [12] J.-H. Ryu, S. Song, and D.-H. Cho, “New Clustering Schemes for Energy Conservation in Two-Tiered Mobile Ad-Hoc Networks,” in Proc. IEEE ICC’01, vo1. 3, June 2001, pp. 862–66.