A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Comparative of Conventional and Intelligence Controller based Hybrid Generati...IJERD Editor
Harmonic pollution of the power supply system has risen significantly in recent years due primarily
to an increase of non-linear loads connected to the utility through residential, commercial and industrial
customers. This paper, proposed a solution to eliminate the harmonics introduced by the nonlinear loads in
steady and in transients. It presents a predictive current control strategy for achieving maximum benefits from
these grid-interfacing inverters implementing conventional DC link controller and intelligence controller, when
installed in 3-phase 4-leg voltage source inverter (VSI). The inverter is controlled to perform as a multi-function
device by incorporating active power filter functionality. The use of a four-leg voltage-source inverter allows
the compensation of current harmonic components, as well as unbalanced current generated by three-phase
nonlinear loads. Renewable energy resources (RES) are being increasingly connected in distribution systems
utilizing power electronic converters. The compensation performance of the proposed active power filter and the
associated hybrid PV/Wind system generation scheme with new control scheme is demonstrated to improve the
power quality features is simulated using MATLAB/SIMULINK.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Comparative of Conventional and Intelligence Controller based Hybrid Generati...IJERD Editor
Harmonic pollution of the power supply system has risen significantly in recent years due primarily
to an increase of non-linear loads connected to the utility through residential, commercial and industrial
customers. This paper, proposed a solution to eliminate the harmonics introduced by the nonlinear loads in
steady and in transients. It presents a predictive current control strategy for achieving maximum benefits from
these grid-interfacing inverters implementing conventional DC link controller and intelligence controller, when
installed in 3-phase 4-leg voltage source inverter (VSI). The inverter is controlled to perform as a multi-function
device by incorporating active power filter functionality. The use of a four-leg voltage-source inverter allows
the compensation of current harmonic components, as well as unbalanced current generated by three-phase
nonlinear loads. Renewable energy resources (RES) are being increasingly connected in distribution systems
utilizing power electronic converters. The compensation performance of the proposed active power filter and the
associated hybrid PV/Wind system generation scheme with new control scheme is demonstrated to improve the
power quality features is simulated using MATLAB/SIMULINK.