SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 571
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Sujata1, Brijbhushan2
1M.Tech, Electronics and Communication, Shoolini University, Solan, H.P, India
2Technical Instructor, Electronics and Communication, Shoolini University, H.P, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - At present, Wireless Sensor Network is most
standard services occupied in commercial and industrial
applications as a result of its technical development in a
processor, communication and low-power usage of
embedded devices. WSN is basically formed by a huge
number of wireless sensors. These sensor nodes are able to
do some kind of processes, gathering sensed information
and as well as communicating with other connected nodes
in the network. One of the major points at issue for Wireless
Sensor Networks (WSNs) is the design of energy-efficient
Routing. The efficiency of wireless sensor network
abundantly depends on the routing protocol used. The
protocol is an important aspect, which can reduce the delay
while offering high energy efficiency and long span of
network lifetime. One of that protocol is PEGASIS, it is rest
on the chain structure and every chain have only one cluster
head, it take the profit of sending data to its closet neighbor.
In this paper, main objective is to achieve energy efficiency
using PEGASIS Routing Protocol for WSN.
Key Words: Wireless sensor networks, routing
protocol, PEGASIS protocol, energy efficiency.
1. INTRODUCTION
Recent technological advances in the area of wireless
communications and micro-electro-mechanical systems
have made it suitable to develop small sized and low cost
sensors. A sensor network is the group of sensors connect
to transducers be determined to monitor the conditions at
diverse locations. The Sensors are meant to evaluate the
physical or environmental changes. A sensor network has
a huge number of nodes, which are arrange in open
environment randomly [1]. The consideration of WSNs
was originally motivated by military applications, but
nowadays it is being carry out in various civilian
applications like intrusion detection, security, weather
monitoring, inventory control, disaster management, etc.
Sensor node is also known as mote which is small,
lightweight and portable devices equipped with a
microcomputer, transducer, power source, and
transceiver. Electrical signals are produced by the
transducer which is based on the sensed physical
phenomena. The information is processed and sensed by
microcomputer. The transceiver receives instructions
from the base station/central computing system and sends
data to it [2].
1.1 Routing in WSN
Routing is conventionally defined as the technique of
determining a path between the source and the
destination node upon request of message transmission
from a given node.
In WSNs, the network layer is mostly acclimated to
perform the routing of data messages. In case of large
multi-hop networks, the source node cannot get as far as
the destination directly, and therefore, intermediate nodes
have to pass on their messages. An intermediate node has
to settle an issue to which neighbor an incoming message
should be forwarded if the message is not to come to itself.
As a matter of course, routing tables that list the most
appropriate neighbor for any given message destination
are used. The implementation of routing tables in the
matter of a particular routing algorithm specifies the paths
for each destination. The construction and maintenance of
these routing tables is the desperate job of both a
centralized and a distributed routing protocol in WSNs.
The construction of these tables basically reduced to
stabilizing what is the path from a given node to reach a
given destination [15].
1.2 Routing Protocols in WSN
Routing protocols are essentially classified into following
categories, which are:-
Location-based Protocols
In location-based protocols, sensor nodes are label by
means of their locations. Location information sensor
networks distance between two particular nodes energy
consumption can be calculated.
Hierarchical Protocols
In the hierarchical Clustering protocol, clustering is an
energy-efficient communication protocol that can be used
by the sensors to circulate their sensed data to the sink.
Data Centric Protocols
In Data-centric protocols, data is delivered from source
sensors to the sink, when the source sensors circulate
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 572
their data to the sink; intermediate sensors can do some
form of aggregation on the data originating from several
source sensors and send the aggregated data into the sink.
This process can result in energy savings because of lesser
transmission required to transmit the data from the
sources to the sink.
Mobility-based Protocols
Mobility leads new challenges to routing protocols in
WSNs. Sink mobility need energy efficient protocols to
insure data delivery originated from source sensors
toward mobile sinks.
Multipath-based Protocols
In view of data transmission between source sensors and
the sink, there are two routing specimen: single-path
routing, multipath routing. In single-path routing, each
source sensor deliver its data to the sink by the shortest
path. In multipath routing, each source sensor finding the
first ‘k’ shortest paths to the sink and divides its load
uniformly among these paths.
Heterogeneity-based Protocols
In this type of sensor network architecture, there are two
kind of sensors: line-powered sensors, they have no
energy constraint, the battery-powered sensors having
insufficient lifetime, and hence should utilize their
available energy efficiently by reducing their potential of
data communication and computation.
QOS-based Protocols
To reduce energy consumption, important point to
examine is quality of service requirements i.e.
interruption, reliability, and fault tolerance.
2. CURRENT SITUATION IN WSN
For the adaptive use of power, many superlative routing
algorithms were proposed. One of them is just based upon
cluster-type system, that protocol is LEACH algorithm and
several others are rest on the chain-structure, that
protocol is PEGASIS algorithm.
2.1. LEACH (Low-Energy Adaptive Clustering
Hierarchy)
LEACH is a routing protocol in which the data is forwarded
to the BS (base station) in a cluster-based manner. There
are few factors which should be noticed such as
maximizing network lifetime, minimizing energy
consumption and performing data processing at
intermediate nodes to lower the number of transmissions.
Being a cluster-based hierarchy, the complete network is
just divided into clusters and every cluster has a cluster-
head assigned to it. Cluster design is dynamic in each and
every round and the cluster head is making decision for
the data collection from all the nodes of that cluster, it
proceeding data and transfer the collected data to the BS.
In LEACH protocol, cluster-heads are elected randomly but
the energy used up for each round is balanced as all sensor
nodes have a possibility to be selected as a cluster-head.
As long as each round, 5% of the all sensor nodes are the
cluster-heads.
2.2. PEGASIS (Power-Efficient Gathering In
Sensor Information System)
Power-Efficient Gathering in Sensor Information Systems
(PEGASIS) is the utmost favored chain based hierarchical
protocol. The nodes are arranged in the form of a chain for
the transportation and aggregation of the data. The
creation of chain can be centralized based on the
application. PEGASIS is based on the presumption that
global knowledge of network is provided to all the nodes.
The creation of chain starts from the lattermost node from
sink and its nearest neighbor are selected as next node in
the chain and so on. The last node must be the sink and the
node before sink acts as a leader of the node. Processes
like data- processing and aggregation are accomplished by
leader node. PEGASIS is not so relevant for the networks
with dynamic or time varying topology. As the size of
network will be larger, the delay in transmission will be as
long, because of that PEGASIS undergoes with scalability
issue.
3. COMPARISON IN LEACH AND PEGASIS
PROTOCOLS
This section just explains a theoretical based comparison
of the leach and pegasis. Both protocols come under
hierarchical class, it means that very few nodes are given
priority over the others nodes. in leach protocol, local data
processing obtain at specific nodes, which are called
cluster-heads and at last the aggregated data is send to the
sink node. on the other part in pegasis protocol, no
aggregation of data occurs. leach is cluster-based
hierarchy, at the same time pegasis is a chain-based
hierarchy. on the other side, about network lifetime,
pegasis provides extended lifetime of the network because
there is a balance in energy distribution. the no. of deaths
of nodes in pegasis is less as compare to leach.
4. ALGORITHM OF PEGASIS PROTOCOL
The algorithm of PEGASIS is just based on the LEACH
protocol. The main idea in PEGASIS is to construct a chain
between all the sensor nodes so that every node can
collect from and transfer to the closest neighbor. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 573
Collected data moves from node to node, it get merged,
and hereafter a designated node (i.e. cluster head)
transmits it to the BS (base station). Nodes take turns send
out to the BS so that the average energy consumed by
every node per round is just reduced. The technique of
building a chain to just reduce the total length is matching
to the traveling salesman trouble, which is so difficult.
Despite of that, with the radio-communication energy
specification, simple chains created with a greedy
approach do the job totally well.
Thus, PEGASIS algorithm is having some advantages as:-
 Normal nodes only reach to their neighbour and
every nodes will take data fusion in regulation.
 The distance of the connected nodes to each other
have been minimized especially
 Nodes take turns to become the cluster head, so it
takes no energy.
 Some of disadvantages of PEGASIS algorithm as:-
 Transmission of data results in time-delay.
 Since the limitation of greedy approach, the
probability of long chain is max.
 The method of cluster head is not at all suitable
for load balance.
5. PROPOSED METHOD
As we knew that there are several issues in the PEGASIS
protocol. The main idea in PEGASIS is for each node to
receive from and transmit to close neighbors and take
turns being the leader for transmission to the BS. This
approach will distribute the energy load evenly among the
sensor nodes in the network. We initially place the nodes
randomly in the play field, and therefore, the i –th node is
at a random location. The nodes will be organized to form
a chain, which can either be accomplished by the sensor
nodes themselves using a greedy algorithm starting from
some node. Alternatively, the BS can compute this chain
and broadcast it to all the sensor nodes. We used random
100-node networks for our simulations. We placed the BS
at a far distance from all other nodes. For constructing the
chain, we assume that all nodes have global knowledge of
the network and employ the greedy algorithm. We could
have constructed a loop, however, to ensure that all nodes
have close neighbors is difficult as this problem is similar
to the traveling salesman problem. The greedy approach
to constructing the chain works well and this is done
before the first round of communication. To construct the
chain, we start with the furthest node from the BS. We
begin with this node in order to make sure that nodes
farther from the BS have close neighbors, as in the greedy
algorithm the neighbor distances will increase gradually
since nodes already on the chain cannot be revisited. By
implementing this routing protocol at the end we were
able to create an energy efficient routing protocol for
wireless sensor network.
6. SIMULATION RESULTS
Our simulation results showed that if we introduce more
number of sensor in network then we can increase the
network efficiency by using pegasis routing protocol in a
network the all sensor do not have to waste their valuable
time and energy for electing the cluster head for each and
every round of its working as like in LEACH routing
protocol in our network we have introduced the sensor
node and analyzed them to a certain period of rounds or
cycles this increased the lifespan but there is a
disadvantage also in this that when the sensor node dies
all the data which is present at that time on sensor nodes
memory also dies so there may be a chance of data loss
when we simulated the network. And the cluster-heads
which are in sleep state may also get affected due to
environmental conditions.
7. CONCLUSIONS
During this work we have observed the working of
PEGASIS Routing protocol for wireless sensor networks
from theory to our simulation. And we concluded that we
can implement the algorithm in the network and our
simulation had a good result we have introduced a 1000
sensor nodes and then created a chain using a greedy
algorithm in network and had seen that network
consumes less energy as they have only one specific task
to perform in the network only sensing and transmitting
the data.
REFERENCES
[1] S. Gobriel. “Energy-efficient design of ad-hoc and
sensor networks”,M.Sc University of Pittsburgh,
2008.
[2] T. Zia and A. Zomaya, “Security Issues in wireless
sensor networks” in proceedings of the
international conference of system and networks
communication, 2006.
[3] A. al-yasiri and A. Sunley, “Data Aggregation in
wireless sensor networks using SOAP
protocol.”Journal of physics conference series 76,
2007
[4] Ravi Kishore Kodali, Naveen kumar Aravapalli,
”multilevel LEACH protocol model Using NS-3,”
IEEE international conference on advance
computing, feb 2014.
[5] A. Ahmed, H. Shi and Y. Sang” a survey on
network protocols for wireless sensor networks,”
in proceedings of information technology:
research and education,aug 2003
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 574
[6] G. Acs and L. Buttyabv. “A Taxonomy of routing
protocols for wireless sensor networks,” BUTE
Telecommunication department, Jan. 2007.
[7] Parminder Kaur, Mrs. MamtaKatiyar,”The Energy-
Efficient Hierarchical Routing Protocols for WSN:
A Review” IJARCSSE, Volume 2, Issue 11,
November 2012 ISSN: 2277 128X.
[8] A F. Akyildiz and W. Su and Y.
Sankarasubramaniam and E. Cayirci, “Wireless
sensor networks: a survey, ” Computer Networks,
Vol.38, pp. 393,422, March 2002.
[9] Naveen Kumar & Mrs. Jasbir Kaur “improved
LEACH Protocol for Wireless sensor Netwroks”,
IEEE, 2011.
[10] Y. Yao and J. Gehrke, The cougar
approach to in-network query processing in
sensor networks", in SIGMOD Record, September
2002.
[11] L. Subramanian and R. H. Katz, An
Architecture for Building Self Con¯gurable
Systems", in the Proceedings of IEEE/ACM
Workshop on Mobile Ad Hoc Networking and
Computing, Boston, MA, August 2000.
[12] http://www.ieee802.org/15/
[13] C. Intanagonwiwat, R. Govindan, and D.
Estrin, "Directed di®usion: a scalable and robust
communication paradigm for sensor networks,"
Proceedings of ACM MobiCom '00, Boston, MA,
2000, pp. 56-67.
[14] D. Braginsky and D. Estrin, Rumor
Routing Algorithm for Sensor Networks," in the
Proceedings of the First Workshop on Sensor
Networks and Applications (WSNA), Atlanta, GA,
October 2002.
[15] C. Schurgers and M.B. Srivastava, Energy
e±cient routing in wireless sensor networks", in
the MILCOM Proceedings on Communications for
Network-Centric Operations: Creating the
Information Force, McLean, VA, 2001.
[16] W. Heinzelman, A. Chandrakasan and H.
Balakrishnan, "Energy-E±cient Communication
Protocol for Wireless Microsensor Networks,"
Proceedings of the 33rd Hawaii International
Conference on System Sciences (HICSS '00),
January 2000.
[17] Neha Rathi, Jyoti Saraswat and
ParthaPratim Bhattacharya,” A REVIEW ON
ROUTING PROTOCOLS FORAPPLICATION IN
WIRELESS SENSORNETWORKS,” International
Journal of Distributed and Parallel Systems
(IJDPS) Vol.3,No.5, September 2012
[18] S. Lindsey, C. Raghavendra, PEGASIS:
Power-E±cient Gathering in Sensor Information
Systems", IEEE Aerospace Conference
Proceedings, 2002, Vol. 3, 9-16 pp. 1125-1130.
[19] A. Manjeshwar and D. P. Agarwal, "TEEN:
a routing protocol for enhanced e±ciency in
wireless sensor networks," In 1st International
Workshop on Parallel and Distributed Computing
Issues in Wireless Networks and Mobile
Computing, April 2001.
[20] N. Bulusu, J. Heidemann, D. Estrin,GPS-
less low cost outdoor localization for very small
devices", Technical report 00-729, Computer
science department, University of Southern
California, Apr. 2000.
[21] Savvides, C-C Han, aind M.
Srivastava,Dynamic ¯ne-grained localization in
Ad-Hoc networks of sensors," Proceedings of the
Seventh ACM Annual International Conference on
Mobile Computing and Networking (MobiCom),
July 2001. Pp. 166-179.
[22] S. Capkun, M. Hamdi, J. Hubaux,"GPS-free
positioning in mobile ad-hoc networks",
Proceedings of the 34th Annual Hawaii
International Conference on System Sciences,
2001 pp. 3481-3490.
[23] Y. Xu, J. Heidemann, D.
Estrin,Geography-informed Energy Conservation
for Ad-hoc Routing," In Proceedings of the
Seventh Annual ACM/IEEE International
Conference on Mobile Computing and Networking
2001, pp. 70-84.
[24] B. Chen, K. Jamieson, H. Balakrishnan, R.
Morris, SPAN: an energy-e±cient coordination
algorithm for topology maintenance in ad hoc
wireless networks", Wireless Networks, Vol. 8, No.
5, Page(s): 481-494, September 2002.
[25] Matlab Wikipedia.
BIOGRAPHY
Sujata, M.Tech, Electronics
And Communication,
Shoolini University, Solan,
H.P, India

More Related Content

What's hot

Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksIJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor NetworkAarthi Raghavendra
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 

What's hot (20)

Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Leach
LeachLeach
Leach
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 

Similar to Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network

IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET Journal
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...IOSR Journals
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetimeijtsrd
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networksiosrjce
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 

Similar to Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network (20)

IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
 
B05630814
B05630814B05630814
B05630814
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
G010633439
G010633439G010633439
G010633439
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 571 Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network Sujata1, Brijbhushan2 1M.Tech, Electronics and Communication, Shoolini University, Solan, H.P, India 2Technical Instructor, Electronics and Communication, Shoolini University, H.P, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - At present, Wireless Sensor Network is most standard services occupied in commercial and industrial applications as a result of its technical development in a processor, communication and low-power usage of embedded devices. WSN is basically formed by a huge number of wireless sensors. These sensor nodes are able to do some kind of processes, gathering sensed information and as well as communicating with other connected nodes in the network. One of the major points at issue for Wireless Sensor Networks (WSNs) is the design of energy-efficient Routing. The efficiency of wireless sensor network abundantly depends on the routing protocol used. The protocol is an important aspect, which can reduce the delay while offering high energy efficiency and long span of network lifetime. One of that protocol is PEGASIS, it is rest on the chain structure and every chain have only one cluster head, it take the profit of sending data to its closet neighbor. In this paper, main objective is to achieve energy efficiency using PEGASIS Routing Protocol for WSN. Key Words: Wireless sensor networks, routing protocol, PEGASIS protocol, energy efficiency. 1. INTRODUCTION Recent technological advances in the area of wireless communications and micro-electro-mechanical systems have made it suitable to develop small sized and low cost sensors. A sensor network is the group of sensors connect to transducers be determined to monitor the conditions at diverse locations. The Sensors are meant to evaluate the physical or environmental changes. A sensor network has a huge number of nodes, which are arrange in open environment randomly [1]. The consideration of WSNs was originally motivated by military applications, but nowadays it is being carry out in various civilian applications like intrusion detection, security, weather monitoring, inventory control, disaster management, etc. Sensor node is also known as mote which is small, lightweight and portable devices equipped with a microcomputer, transducer, power source, and transceiver. Electrical signals are produced by the transducer which is based on the sensed physical phenomena. The information is processed and sensed by microcomputer. The transceiver receives instructions from the base station/central computing system and sends data to it [2]. 1.1 Routing in WSN Routing is conventionally defined as the technique of determining a path between the source and the destination node upon request of message transmission from a given node. In WSNs, the network layer is mostly acclimated to perform the routing of data messages. In case of large multi-hop networks, the source node cannot get as far as the destination directly, and therefore, intermediate nodes have to pass on their messages. An intermediate node has to settle an issue to which neighbor an incoming message should be forwarded if the message is not to come to itself. As a matter of course, routing tables that list the most appropriate neighbor for any given message destination are used. The implementation of routing tables in the matter of a particular routing algorithm specifies the paths for each destination. The construction and maintenance of these routing tables is the desperate job of both a centralized and a distributed routing protocol in WSNs. The construction of these tables basically reduced to stabilizing what is the path from a given node to reach a given destination [15]. 1.2 Routing Protocols in WSN Routing protocols are essentially classified into following categories, which are:- Location-based Protocols In location-based protocols, sensor nodes are label by means of their locations. Location information sensor networks distance between two particular nodes energy consumption can be calculated. Hierarchical Protocols In the hierarchical Clustering protocol, clustering is an energy-efficient communication protocol that can be used by the sensors to circulate their sensed data to the sink. Data Centric Protocols In Data-centric protocols, data is delivered from source sensors to the sink, when the source sensors circulate
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 572 their data to the sink; intermediate sensors can do some form of aggregation on the data originating from several source sensors and send the aggregated data into the sink. This process can result in energy savings because of lesser transmission required to transmit the data from the sources to the sink. Mobility-based Protocols Mobility leads new challenges to routing protocols in WSNs. Sink mobility need energy efficient protocols to insure data delivery originated from source sensors toward mobile sinks. Multipath-based Protocols In view of data transmission between source sensors and the sink, there are two routing specimen: single-path routing, multipath routing. In single-path routing, each source sensor deliver its data to the sink by the shortest path. In multipath routing, each source sensor finding the first ‘k’ shortest paths to the sink and divides its load uniformly among these paths. Heterogeneity-based Protocols In this type of sensor network architecture, there are two kind of sensors: line-powered sensors, they have no energy constraint, the battery-powered sensors having insufficient lifetime, and hence should utilize their available energy efficiently by reducing their potential of data communication and computation. QOS-based Protocols To reduce energy consumption, important point to examine is quality of service requirements i.e. interruption, reliability, and fault tolerance. 2. CURRENT SITUATION IN WSN For the adaptive use of power, many superlative routing algorithms were proposed. One of them is just based upon cluster-type system, that protocol is LEACH algorithm and several others are rest on the chain-structure, that protocol is PEGASIS algorithm. 2.1. LEACH (Low-Energy Adaptive Clustering Hierarchy) LEACH is a routing protocol in which the data is forwarded to the BS (base station) in a cluster-based manner. There are few factors which should be noticed such as maximizing network lifetime, minimizing energy consumption and performing data processing at intermediate nodes to lower the number of transmissions. Being a cluster-based hierarchy, the complete network is just divided into clusters and every cluster has a cluster- head assigned to it. Cluster design is dynamic in each and every round and the cluster head is making decision for the data collection from all the nodes of that cluster, it proceeding data and transfer the collected data to the BS. In LEACH protocol, cluster-heads are elected randomly but the energy used up for each round is balanced as all sensor nodes have a possibility to be selected as a cluster-head. As long as each round, 5% of the all sensor nodes are the cluster-heads. 2.2. PEGASIS (Power-Efficient Gathering In Sensor Information System) Power-Efficient Gathering in Sensor Information Systems (PEGASIS) is the utmost favored chain based hierarchical protocol. The nodes are arranged in the form of a chain for the transportation and aggregation of the data. The creation of chain can be centralized based on the application. PEGASIS is based on the presumption that global knowledge of network is provided to all the nodes. The creation of chain starts from the lattermost node from sink and its nearest neighbor are selected as next node in the chain and so on. The last node must be the sink and the node before sink acts as a leader of the node. Processes like data- processing and aggregation are accomplished by leader node. PEGASIS is not so relevant for the networks with dynamic or time varying topology. As the size of network will be larger, the delay in transmission will be as long, because of that PEGASIS undergoes with scalability issue. 3. COMPARISON IN LEACH AND PEGASIS PROTOCOLS This section just explains a theoretical based comparison of the leach and pegasis. Both protocols come under hierarchical class, it means that very few nodes are given priority over the others nodes. in leach protocol, local data processing obtain at specific nodes, which are called cluster-heads and at last the aggregated data is send to the sink node. on the other part in pegasis protocol, no aggregation of data occurs. leach is cluster-based hierarchy, at the same time pegasis is a chain-based hierarchy. on the other side, about network lifetime, pegasis provides extended lifetime of the network because there is a balance in energy distribution. the no. of deaths of nodes in pegasis is less as compare to leach. 4. ALGORITHM OF PEGASIS PROTOCOL The algorithm of PEGASIS is just based on the LEACH protocol. The main idea in PEGASIS is to construct a chain between all the sensor nodes so that every node can collect from and transfer to the closest neighbor. The
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 573 Collected data moves from node to node, it get merged, and hereafter a designated node (i.e. cluster head) transmits it to the BS (base station). Nodes take turns send out to the BS so that the average energy consumed by every node per round is just reduced. The technique of building a chain to just reduce the total length is matching to the traveling salesman trouble, which is so difficult. Despite of that, with the radio-communication energy specification, simple chains created with a greedy approach do the job totally well. Thus, PEGASIS algorithm is having some advantages as:-  Normal nodes only reach to their neighbour and every nodes will take data fusion in regulation.  The distance of the connected nodes to each other have been minimized especially  Nodes take turns to become the cluster head, so it takes no energy.  Some of disadvantages of PEGASIS algorithm as:-  Transmission of data results in time-delay.  Since the limitation of greedy approach, the probability of long chain is max.  The method of cluster head is not at all suitable for load balance. 5. PROPOSED METHOD As we knew that there are several issues in the PEGASIS protocol. The main idea in PEGASIS is for each node to receive from and transmit to close neighbors and take turns being the leader for transmission to the BS. This approach will distribute the energy load evenly among the sensor nodes in the network. We initially place the nodes randomly in the play field, and therefore, the i –th node is at a random location. The nodes will be organized to form a chain, which can either be accomplished by the sensor nodes themselves using a greedy algorithm starting from some node. Alternatively, the BS can compute this chain and broadcast it to all the sensor nodes. We used random 100-node networks for our simulations. We placed the BS at a far distance from all other nodes. For constructing the chain, we assume that all nodes have global knowledge of the network and employ the greedy algorithm. We could have constructed a loop, however, to ensure that all nodes have close neighbors is difficult as this problem is similar to the traveling salesman problem. The greedy approach to constructing the chain works well and this is done before the first round of communication. To construct the chain, we start with the furthest node from the BS. We begin with this node in order to make sure that nodes farther from the BS have close neighbors, as in the greedy algorithm the neighbor distances will increase gradually since nodes already on the chain cannot be revisited. By implementing this routing protocol at the end we were able to create an energy efficient routing protocol for wireless sensor network. 6. SIMULATION RESULTS Our simulation results showed that if we introduce more number of sensor in network then we can increase the network efficiency by using pegasis routing protocol in a network the all sensor do not have to waste their valuable time and energy for electing the cluster head for each and every round of its working as like in LEACH routing protocol in our network we have introduced the sensor node and analyzed them to a certain period of rounds or cycles this increased the lifespan but there is a disadvantage also in this that when the sensor node dies all the data which is present at that time on sensor nodes memory also dies so there may be a chance of data loss when we simulated the network. And the cluster-heads which are in sleep state may also get affected due to environmental conditions. 7. CONCLUSIONS During this work we have observed the working of PEGASIS Routing protocol for wireless sensor networks from theory to our simulation. And we concluded that we can implement the algorithm in the network and our simulation had a good result we have introduced a 1000 sensor nodes and then created a chain using a greedy algorithm in network and had seen that network consumes less energy as they have only one specific task to perform in the network only sensing and transmitting the data. REFERENCES [1] S. Gobriel. “Energy-efficient design of ad-hoc and sensor networks”,M.Sc University of Pittsburgh, 2008. [2] T. Zia and A. Zomaya, “Security Issues in wireless sensor networks” in proceedings of the international conference of system and networks communication, 2006. [3] A. al-yasiri and A. Sunley, “Data Aggregation in wireless sensor networks using SOAP protocol.”Journal of physics conference series 76, 2007 [4] Ravi Kishore Kodali, Naveen kumar Aravapalli, ”multilevel LEACH protocol model Using NS-3,” IEEE international conference on advance computing, feb 2014. [5] A. Ahmed, H. Shi and Y. Sang” a survey on network protocols for wireless sensor networks,” in proceedings of information technology: research and education,aug 2003
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 574 [6] G. Acs and L. Buttyabv. “A Taxonomy of routing protocols for wireless sensor networks,” BUTE Telecommunication department, Jan. 2007. [7] Parminder Kaur, Mrs. MamtaKatiyar,”The Energy- Efficient Hierarchical Routing Protocols for WSN: A Review” IJARCSSE, Volume 2, Issue 11, November 2012 ISSN: 2277 128X. [8] A F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor networks: a survey, ” Computer Networks, Vol.38, pp. 393,422, March 2002. [9] Naveen Kumar & Mrs. Jasbir Kaur “improved LEACH Protocol for Wireless sensor Netwroks”, IEEE, 2011. [10] Y. Yao and J. Gehrke, The cougar approach to in-network query processing in sensor networks", in SIGMOD Record, September 2002. [11] L. Subramanian and R. H. Katz, An Architecture for Building Self Con¯gurable Systems", in the Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, Boston, MA, August 2000. [12] http://www.ieee802.org/15/ [13] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed di®usion: a scalable and robust communication paradigm for sensor networks," Proceedings of ACM MobiCom '00, Boston, MA, 2000, pp. 56-67. [14] D. Braginsky and D. Estrin, Rumor Routing Algorithm for Sensor Networks," in the Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA, October 2002. [15] C. Schurgers and M.B. Srivastava, Energy e±cient routing in wireless sensor networks", in the MILCOM Proceedings on Communications for Network-Centric Operations: Creating the Information Force, McLean, VA, 2001. [16] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-E±cient Communication Protocol for Wireless Microsensor Networks," Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS '00), January 2000. [17] Neha Rathi, Jyoti Saraswat and ParthaPratim Bhattacharya,” A REVIEW ON ROUTING PROTOCOLS FORAPPLICATION IN WIRELESS SENSORNETWORKS,” International Journal of Distributed and Parallel Systems (IJDPS) Vol.3,No.5, September 2012 [18] S. Lindsey, C. Raghavendra, PEGASIS: Power-E±cient Gathering in Sensor Information Systems", IEEE Aerospace Conference Proceedings, 2002, Vol. 3, 9-16 pp. 1125-1130. [19] A. Manjeshwar and D. P. Agarwal, "TEEN: a routing protocol for enhanced e±ciency in wireless sensor networks," In 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, April 2001. [20] N. Bulusu, J. Heidemann, D. Estrin,GPS- less low cost outdoor localization for very small devices", Technical report 00-729, Computer science department, University of Southern California, Apr. 2000. [21] Savvides, C-C Han, aind M. Srivastava,Dynamic ¯ne-grained localization in Ad-Hoc networks of sensors," Proceedings of the Seventh ACM Annual International Conference on Mobile Computing and Networking (MobiCom), July 2001. Pp. 166-179. [22] S. Capkun, M. Hamdi, J. Hubaux,"GPS-free positioning in mobile ad-hoc networks", Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001 pp. 3481-3490. [23] Y. Xu, J. Heidemann, D. Estrin,Geography-informed Energy Conservation for Ad-hoc Routing," In Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking 2001, pp. 70-84. [24] B. Chen, K. Jamieson, H. Balakrishnan, R. Morris, SPAN: an energy-e±cient coordination algorithm for topology maintenance in ad hoc wireless networks", Wireless Networks, Vol. 8, No. 5, Page(s): 481-494, September 2002. [25] Matlab Wikipedia. BIOGRAPHY Sujata, M.Tech, Electronics And Communication, Shoolini University, Solan, H.P, India