Open Access   Article Go Back

An Energy Balanced Algorithm of PEGASIS Protocol in WSN

Kangka Chakravarty1 , Utpal Barman2

Section:Review Paper, Product Type: Journal Paper
Volume-04 , Issue-07 , Page no. 53-57, Dec-2016

Online published on Dec 09, 2016

Copyright © Kangka Chakravarty , Utpal Barman . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kangka Chakravarty , Utpal Barman, “An Energy Balanced Algorithm of PEGASIS Protocol in WSN,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.53-57, 2016.

MLA Style Citation: Kangka Chakravarty , Utpal Barman "An Energy Balanced Algorithm of PEGASIS Protocol in WSN." International Journal of Computer Sciences and Engineering 04.07 (2016): 53-57.

APA Style Citation: Kangka Chakravarty , Utpal Barman, (2016). An Energy Balanced Algorithm of PEGASIS Protocol in WSN. International Journal of Computer Sciences and Engineering, 04(07), 53-57.

BibTex Style Citation:
@article{Chakravarty_2016,
author = {Kangka Chakravarty , Utpal Barman},
title = {An Energy Balanced Algorithm of PEGASIS Protocol in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {04},
Issue = {07},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {53-57},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=153},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=153
TI - An Energy Balanced Algorithm of PEGASIS Protocol in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Kangka Chakravarty , Utpal Barman
PY - 2016
DA - 2016/12/09
PB - IJCSE, Indore, INDIA
SP - 53-57
IS - 07
VL - 04
SN - 2347-2693
ER -

           

Abstract

Energy efficiency is the important work for wireless sensor network. Every node has limited energy .So to design Routing protocol in WSN ones should take care of less energy consumption. Already many routing algorithm has developed which result is less energy consumption. In this paper we have discussed all well-known PEGASIS routing algorithms based on grid which always focus on low energy consumption. Each algorithm is described in detail with their pros and cons along with their design issue .

Key-Words / Index Term

Wireless Sensor Network, PEGASIS, PDCH, EEPB, IEEPB,MH-PEGASIS, PEGASIS-ANT

References

[1]. S. Lindsey,. and C.S. Raghavendra, C.S. “PEGASIS: Power-efficient gathering in sensor information systems”. In IEEE proceeding on aerospace, 3, 1125-1130.
[2]. Meenu, and Vandana, “Modified PEGASIS in WSN to increase Network Lifetime,” in International Journal of Computer Applications (0975-8887), Volume 52- No. 19, August 2012.
[3]. J. Rana, S Vhatkar, and M. Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor Network,” in International Journal of Computer Applications (0975-8887).
[4]. Singhal, Vishakha, and Shrutika Suri. "Comparative study of hierarchical routing protocols in wireless sensor networks." International Journal of Computer Science and Engineering 2.5 (2014): 142-147.
[5]. Nathiya, R., and S. G. Santhi. "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)." International Journal of Computer Sciences and Engineering 2 (2014): 36-43.
[6]. S. Vhatkar, J Rana, and M. Atique, “Performance Evaluation and QOS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks,” IOSR Journal of Computer Enginering(IOSR-JCE) e-ISSN: 2278-0661,p-ISSN:2278-8727, Volume 17, Issue 5, ver. IV(Sep.-Oct. 2015), PP 101-109.
[7]. Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor Networks,” in Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), vol. 4, pp. 2230-2233, Shanghai, 2011.
[8]. Z. Aliouat and M. Aliouat, “Efficient Management of Energy Budget for PEGASIS Routing Protocol,” in 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 516-521, Sousse, March 2012.
[9]. Atul Rana, Manju Bala and Varsha , "Review Paper on MSEEC: Energy Efficient Clustering Protocol in HWSN", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (71-75), May -2016
[10]. P. Singh, S. Singh, “A Review: Power efficient Gathering in Sensor Information system(PEGASIS) protocol for WSN,” in International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056,p-ISSN:2395-0072,Volume 2, Issue 03,june-2015.
[11]. Sharma, Shamneesh, Dinesh Kumar, and Keshav Kishore. "Wireless Sensor Networks-A Review on Topologies and Node Architecture." International Journal of Computer Sciences and Engineering 1.2 (2013): 19-25.
[12]. Sujata Agrawal, K.D. Kulat and M. B.Daigavane, "Evaluation of Routing Algorithm for Ad-hoc and Wireless Sensor Network Protocol", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (11-18), Oct -2013
[13]. Obulapu Hiteshreddy, Pardeep Singh and Siddharth Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-08, Page No (37-45), Aug -2015,
[14]. Sanchita Gupta and Pooja Saini, "Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-02, Page No (21-23), May -Jun 2013
[15]. Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-03, Issue-02, Page No (1-14), Mar -Apr 2015