Energy Efficient Techniques in Wireless Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-40 Number-1
Year of Publication : 2016
Authors : M. Jagadheeswari, Dr. M. Anand kumar
  10.14445/22312803/IJCTT-V40P110

MLA

M. Jagadheeswari, Dr. M. Anand kumar "Energy Efficient Techniques in Wireless Networks". International Journal of Computer Trends and Technology (IJCTT) V40(1):55-59, October 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Energy efficiency for wireless sensor network is used for factory automation to find out the deception attack. In wireless network, deception attack will damage the network data and produce more damage the data and its integrity. The main problem of host which is in wireless network is energy consumption. Host will take more energy while its data transmission. It unnecessarily wastes its resources due to its delay of packet transmission and packets lose. If the system always monitors the network, its resource will be waste. These problems will be overcome through TAM and CAR algorithm.

References
[1] Zahra Rezaei, Shima Mobininejad, “Energy Saving in Wireless Sensor Networks”, IJCSES, Vol . 3 No. 1, Feb 2012, DOI: 10.5121/ijcses.2012.3103. 23
[2] Gurpreet Singh Sodhi, Sarabjit Singh, “Increasing the performance of wireless sensor networks using IM-LEACH”, IJESC, March 2015, DOI: 10.4010/2015.311
[3] Amit Sharma, Kshitij Shinghal, Neelam Srivastava, Raghuvir Singh, “Energy Management for Wireless Sensor Network Nodes”, IJAET, Vol. 1, Mar 2011.
[4] Snehal P. Dongare, R. S. Mangrulkar, “An improved cluster head selection approach for energy efficiency in wireless sensor networks: A review”, IEEE, Jan 2015, DOI: 10.1109/PERVASIVE.2015.7087190
[5] D.Suresh , K.Selvakumar, “Improving Network Lifetime and Reducing Energy Consumption in Wireless Sensor Networks”, IJCSIT, Vol. 5 (2) , 2014.
[6] Yingwei Yao, and Georgios B. Giannakis, “Energy- Efficient Scheduling for Wireless Sensor Networks”, IEEE, VOL. 53, NO. 8, AUGUST 2005, DOI: 10.1109/TCOMM.2005.852834.
[7] Subhash Dhar Dwivedi, Praveen Kaushik, “Energy Efficient Routing Algorithm with sleep scheduling in Wireless Sensor Network”, IJCSIT, Vol. 3 (3), 2012.
[8] Aly M. El-Semary, “Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and μTesla forWireless Sensor Networks”, International Journal of Sensor Networks and Data Communications, Vol. 1 (2012), Ashdin Publishing, doi:10.4303/ijsndc/X110201.
[9] Dhanunjayudu.K, Mahesh.B, “Trust-Based Secure And Energy Efficient Routing Framework For WSNS”, IJCTT, volume 5, number 1, Nov 2013, DOI: 10.14445/22312803/IJCTT-V5N1P101
[10] Amandeep Kaur, Kamaljit Kaur, “A Review of Different Energy Efficiency Techniques in Wireless Sensor Networks”, Volume 5, Issue 6, June 2015, Doi: 10.1007/s11276-015-1025-x.
[11] Sanghamitra Panda, Satyanarayana Gandi, Amarendra Kothalanka, “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks”,IJARCCE, Vol. 4, Issue 1, January 2015, DOI: 10.17148/IJARCCE.2015.4106. 27
[12]Chih-Wei Shiou,Frank Yeong-SungLin, Hsu-Chen Cheng, and Yean Fu-Wen, “OptimalEnergy-EfficientRouting forWireless SensorNetworks”, IEEE, 2005, DOI: 10.1109/AINA.2005.268.
[13] Kalaiselvan. K, Gurpreet Singh, “Detection and Isolation of Black Hole Attack in Wireless Sensor Networks”, IJIRSET, Vol. 4, Issue 5, May 2015, DOI: 10.15680/IJIRSET.2015.04050107. 3516
[14] Satyajayant Misr, Kabi Bhattarai, and Guoliang Xue, “Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks” .
[15] Nidhi Chhajed and Mayank Sharma, “Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks (WSN’s): A Review”, IJARCSSE, Volume 4, Issue 11, November 2014, DOI: 10.1002/wcm.v8:6. [14].
[16] Ira Nath and Dr. Rituparna Chaki, “BHAPSC: A New Black Hole Attack Prevention System in Clustered MANET”, IJARCSSE, Volume 2, Issue 8, August 2012, DOI: 10.1002/sec.144. 11.
[17] P. Samundiswary,Padma Priyadarshini and P. Dananjayan, “Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks”, IJCEE, Vol. 2, No. 1, February, 2010
[18] Edith C. H. Ngai and Michael R. Lyu, “On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks”, IEEE, Volume 8, June 2006, DOI: 10.1109/ICC.2006.255595
[19] Omid Naderi and Sayyed Majid Mazinani, “A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks”, IJIET, Vol. 5, No. 7, July 2015, DOI: 10.7763/IJIET.2015.V5.561
[20] Edith C.H. Ngai, Jiangchuan Liu, Michael R. Lyu, “An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks”, Elsevier journal, 2014, DOI: 10.1016/j.comcom.2007.04.025.

Keywords
Energy Efficient, Intrusion Detection System, Power saving techniques.