An Energy Balanced Algorithm of PEGASIS Protocol in WSN
Kangka Chakravarty1 , Utpal Barman2
Section:Review Paper, Product Type: Journal Paper
Volume-04 ,
Issue-07 , Page no. 53-57, Dec-2016
Online published on Dec 09, 2016
Copyright © Kangka Chakravarty , Utpal Barman . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Kangka Chakravarty , Utpal Barman, “An Energy Balanced Algorithm of PEGASIS Protocol in WSN,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.53-57, 2016.
MLA Citation
MLA Style Citation: Kangka Chakravarty , Utpal Barman "An Energy Balanced Algorithm of PEGASIS Protocol in WSN." International Journal of Computer Sciences and Engineering 04.07 (2016): 53-57.
APA Citation
APA Style Citation: Kangka Chakravarty , Utpal Barman, (2016). An Energy Balanced Algorithm of PEGASIS Protocol in WSN. International Journal of Computer Sciences and Engineering, 04(07), 53-57.
BibTex Citation
BibTex Style Citation:
@article{Chakravarty_2016,
author = {Kangka Chakravarty , Utpal Barman},
title = {An Energy Balanced Algorithm of PEGASIS Protocol in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {04},
Issue = {07},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {53-57},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=153},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=153
TI - An Energy Balanced Algorithm of PEGASIS Protocol in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Kangka Chakravarty , Utpal Barman
PY - 2016
DA - 2016/12/09
PB - IJCSE, Indore, INDIA
SP - 53-57
IS - 07
VL - 04
SN - 2347-2693
ER -




Abstract
Energy efficiency is the important work for wireless sensor network. Every node has limited energy .So to design Routing protocol in WSN ones should take care of less energy consumption. Already many routing algorithm has developed which result is less energy consumption. In this paper we have discussed all well-known PEGASIS routing algorithms based on grid which always focus on low energy consumption. Each algorithm is described in detail with their pros and cons along with their design issue .
Key-Words / Index Term
Wireless Sensor Network, PEGASIS, PDCH, EEPB, IEEPB,MH-PEGASIS, PEGASIS-ANT
References
[1]. S. Lindsey,. and C.S. Raghavendra, C.S. “PEGASIS: Power-efficient gathering in sensor information systems”. In IEEE proceeding on aerospace, 3, 1125-1130.
[2]. Meenu, and Vandana, “Modified PEGASIS in WSN to increase Network Lifetime,” in International Journal of Computer Applications (0975-8887), Volume 52- No. 19, August 2012.
[3]. J. Rana, S Vhatkar, and M. Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor Network,” in International Journal of Computer Applications (0975-8887).
[4]. Singhal, Vishakha, and Shrutika Suri. "Comparative study of hierarchical routing protocols in wireless sensor networks." International Journal of Computer Science and Engineering 2.5 (2014): 142-147.
[5]. Nathiya, R., and S. G. Santhi. "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)." International Journal of Computer Sciences and Engineering 2 (2014): 36-43.
[6]. S. Vhatkar, J Rana, and M. Atique, “Performance Evaluation and QOS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks,” IOSR Journal of Computer Enginering(IOSR-JCE) e-ISSN: 2278-0661,p-ISSN:2278-8727, Volume 17, Issue 5, ver. IV(Sep.-Oct. 2015), PP 101-109.
[7]. Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor Networks,” in Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), vol. 4, pp. 2230-2233, Shanghai, 2011.
[8]. Z. Aliouat and M. Aliouat, “Efficient Management of Energy Budget for PEGASIS Routing Protocol,” in 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 516-521, Sousse, March 2012.
[9]. Atul Rana, Manju Bala and Varsha , "Review Paper on MSEEC: Energy Efficient Clustering Protocol in HWSN", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (71-75), May -2016
[10]. P. Singh, S. Singh, “A Review: Power efficient Gathering in Sensor Information system(PEGASIS) protocol for WSN,” in International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056,p-ISSN:2395-0072,Volume 2, Issue 03,june-2015.
[11]. Sharma, Shamneesh, Dinesh Kumar, and Keshav Kishore. "Wireless Sensor Networks-A Review on Topologies and Node Architecture." International Journal of Computer Sciences and Engineering 1.2 (2013): 19-25.
[12]. Sujata Agrawal, K.D. Kulat and M. B.Daigavane, "Evaluation of Routing Algorithm for Ad-hoc and Wireless Sensor Network Protocol", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (11-18), Oct -2013
[13]. Obulapu Hiteshreddy, Pardeep Singh and Siddharth Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-08, Page No (37-45), Aug -2015,
[14]. Sanchita Gupta and Pooja Saini, "Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-02, Page No (21-23), May -Jun 2013
[15]. Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-03, Issue-02, Page No (1-14), Mar -Apr 2015