Prolonging the network lifetime depends on efficient management of sensing node energy resource. Energy consumption is therefore one of the most crucial design issues in WSN. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical routing protocols greatly minimize energy consumed in… (More)
unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The deployment of wireless sensor networks in many application areas requires self organization of the network nodes into clusters. The clustering Algorithm is a kind of key technique used to reduce energy consumption. Efficient way to enhance the lifetime of the system is to partition the network into distinct clusters with a high energy node as cluster… (More)
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However security is one of the major aspects of Wireless… (More)
Wireless sensor nodes are resource constrained and have limited amount of energy. Therefore, designing protocols that conserve energy is an important area of research. Researchers have investigated architectures and topologies that allow energy efficient operation of WSNs. One of the popular techniques in this regard is clustering. The different methods of… (More)
Wireless sensor networks have gained major attention from most of the recent research community. One of the important issues in this type of networks is the inherent limited power of the network sensor nodes. Hierarchical routing protocols are incorporate of efficiently balancing the load on the sensor nodes. But, dice the death of some nodes to the network… (More)
Coverage preservation and connectivity are the most essential functions to guarantee quality of service (QoS) in wireless sensor network. Therefore, the goal of an optimal sensor deployment strategy is to have a globally connected network, while optimizing coverage at the same time. By optimizing coverage, the deployment strategy would guarantee that… (More)
The main contribution in this paper is to improve the weakness of cookies exchange in the handshake process in order to counter DoS attacks. The enhanced protocol is performed on Cooja simulator in Contiki operating system for the Internet of Things, and compared with the original DTLS. The simulation results lead to better performance of the proposed… (More)