SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378
A REVIEW PAPER ON ENERGY EFFICIENT TECHNIQUE OF WIRELESS
SENSOR NETWORKS
Heena1, Simranjit kaur 2
1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and
Technology(Badhani), Punjab,India
2Assistant professor, Dept. of electronics & Communication Engineering, Sri Sai College of Engineering and
Technology(Badhani), Punjab,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The wireless sensor networks isthetypeofnetwork
in which sensor nodes sense the environmental conditionsand
pass the sensed information to the basestation. Thenetworkis
deployed on the far places and size of the sensor nodes are
very small due to battery power of the nodes is limited. Due to
far deployment of the network, it is very difficult to recharge
or replace battery of the nodes. The Mobile adhoc network is
also decentralized type of network in which no central
controller is present due to which security attacksarepossible
in the network In the recent times, various techniques has
been proposed which reduce energy consumption of the
network. In this paper, various energy efficient techniques of
wireless sensor networks is been reviewed and discussed and
various security techniques for mobile adhoc network are
discussed
Key Words: WSN,Leach,Clustering
1. INTRODUCTION
There are large numbers of applications of wireless sensor
networks due to their various properties. There are a lot of
benefits of these types of networks which are the reason of
their increasing demands. Wireless sensor networksconsist
of sensor nodes which are small in size, cheap, and also have
self-contained battery powered systems [1]. The input
received from adjacent sensor is processed by the sensor
nodes. Further, the result is transmitted to transit network
within the network. The WSNs are used to monitor the
surroundings of area in which they areplacedandgather the
important information according to the physical parameters
such as pressure, temperature, etc. They are dispersed type
of networks which have lightweight, small sensor nodes.
There is limited power, memory as well as computational
capacity in each sensor node [2]. There are various resource
constraints such as limited amount of energy, low
bandwidth, storage and limited processing present within
each node of a WSN. There a certain design constraints as
well, which are completely application dependent and are
also based on the monitored environment. It completely
depends on the surroundings to define the deployment
scheme, network topology as well as the size determination
of the network [3]. There are few nodes required for the
internal environments where as a large numberof nodesare
required for the purpose of external environments. The
sensor nodes of a network can communicatewitheachother
or also with the external base stations of a network. The
important part of a sensor node is the battery which is very
important as it affects the network’s lifetime directly [4].
There are various energy-optimized solutions proposed at
various levels of the system for improving the battery
consumptions of sensor nodes.Thecommunicationamongst
the sensor nodes is done with the helpofradiosignals.There
are various applications which use WSN and also include
non-conventional paradigms which help in protocol design
which involve various constraints. For the purpose of path
determination from the source to the destination node, the
routing method is utilized. There are various categories
according to which the routing protocols are classified. The
reactive and proactive are one of the types of classifications
of routing protocols. Before the demand of a routing traffic
the routing paths as well as the states are provided in the
network using the proactive routing protocols [5]. The
protocols which trigger the routing actions when the data is
to be sent to various nodes is known as the reactive routing
protocol. On the basis of their initiation which is source-
initiation (Src-initiated) or destination initiation (Dst-
initiated) the routing protocolsareclassified.Onthedemand
of source node, the source-initiated protocol provides the
routing path which begins from thesourcenode. Therouting
path is initiated from the destination node in case of
destination-initiated protocol [6]. On the basis of the sensor
network architecturealsotheroutingprotocolsareclassified
which are the homogeneous nodes as well as the
heterogeneous nodes. The protocols can also be here
classified further on the basis of the topology theyuse which
is mainly the flat topology or the hierarchical topology. The
protocols in which the sensor nodes are addressedusingthe
locations are known as the location-based protocol. For the
purpose of calculating the distance between two specific
nodes, the location information of nodes is required by the
network. This also helps in estimating the energy
consumption of the node [7]. The Geographic Adaptive
Fidelity (GAF) is an energy-aware routing protocol which is
used for the purpose of energy conservation mainly.
1.1 Attacks in Adhoc networks
1.1.1. Black hole Attack: In this attack, an attacker
advertises a zero metric for all destinations bringing about
all nodes around it to route packets towards it. A malicious
hub sends fake routing information, asserting that it has an
optimum route and causes other good nodes to route data
packets through the malicious one. A malicioushubdropsall
packets that it receives instead ofnormallyforwardingthose
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379
packets. An attacker listen the solicitations in a flooding
based convention [3].
1.1.2. Wormhole Attack: In a wormhole attack, an attacker
receives packets at one point in the network, "tunnels"them
to another point in the network, and after that replays them
into the network starting there. Routing can be disrupted
when routing control message are tunneled. This tunnel
between two colluding attacks is known as a wormhole. In
DSR, AODV this attack could prevent discovery of anyroutes
and may make a wormhole even for parcel not address to
itself as a result of broadcasting. Wormholes are hard to
detect on the grounds that the path that is utilized to passon
information is typically not part of the actual network.
Wormholes are dangerous on the grounds that they can do
damage without even knowing the network.
1.1.3. Byzantine attack: A compromised with set of
intermediate, or intermediate nodes that working alone
inside network do attacks, for example, making routing
loops, forwarding packets through non - ideal paths or
specifically dropping packets which brings about disruption
or degradation of routing services inside the network [4].
1.1.4.Rushing attack: Two colluded attackers utilize the
tunnel procedure to shape a wormhole. On the off chance
that a fast transmission path (e.g.a dedicatedchannel shared
by attackers) exists between the two closures of the
wormhole, the tunneled packets can propagate faster than
those through a normal multi-hop route.
1.1.5. Traffic Monitoring: It can be developed to identify
the communication parties and functionality which could
give information to launch additionally attacks .It is not
particular to MANET, different wireless network, for
example, cellular, satellite and WLAN likewise suffer from
these potential vulnerabilities [5].
1.1.6. Eavesdropping: The term eavesdrops implies
overhearing without expending any expending any
additional effort. In this intercepting and reading and
conversation of message by unintended beneficiary occur.
Portable host in versatile specially appointed network
shares a wireless medium. Majorities of wireless
communication utilizeRF rangeandcommunicateby nature.
Message transmitted can beeavesdroppedandfakemessage
can be infused into network.
1.1.7. Denial of service attack: Denial ofserviceattacksare
gone for complete disruption of routing information and
accordingly the whole operation of specially appointed
network [6].
1.1.8. Gray-hole attack: This attack is otherwise called
routing misbehavior attack which leads to dropping of
messages. Dark hole attack has two phases. In the main
phase the hub advertise itself as having a valid route to
destination while in second phase, nodes drops captured
packets with a specific probability.
2. LITERATURE REVIEW
Sarab F. Al Rubeaai, et.al (2015) proposed in this paper, [8],
a novel 3D real-time geographical routing protocol
(3DRTGP) for WSNs. The numbers of forwarding nodes
within the network are controlled by this protocol. This is
done by limiting the forwarding to a unique packet
forwarding region (PFR). Under the different network
densities and traffic load conditions, the performanceofthis
protocol is evaluated by performing certainsimulations.The
needs of real-time applications are fulfilled with the help of
the network tuning parameters that are provided by the
results. Within the 3D deployments, the Void Node Problem
(VNP) is solved by the 3DRTGP heuristically. Even when
there is no network partitioning, the 3DRTGP helps is
resolving the VNP. With respect to the end-t-end delay and
miss ration parameters, this protocol has shown better
performance than the other routing protocols.
Adnan Ahmed, et.al (2015) proposed in this paper [9], a
Trust and Energy aware Routing Protocol (TERP). For the
purpose of detection and isolation of malicious nodes, this
distributed trust model isused.Acompositeroutingfunction
is included in TERP which provides trust, residual-energy as
well as hop counts of neighboring nodes which will further
help in taking therouting decisions.Theenergyconsumption
amongst the trusted nodesis balancedwhentheroutingdata
utilizes the shorter paths with the help of this routing
strategy. According to the simulation results achieved there
is a reduction in the energy consumption, enhancement in
the throughput as well as lifetime of the network when the
TERP is used as compared to other protocols.
Gurbinder Singh Brar, et.al (2016) proposed in this paper
[10], a directional transmission based energy aware routing
protocol named as PDORP is proposed. The properties of
Power Efficient Gathering Sensor Information System
(PEGASIS) and DSR routing protocols are combined in this
newly proposed protocol. A comparison in between the
hybridization approach and the newly proposedapproachis
given. The performance analysis shows that there is a
reduction in the bit error rate, delay and energy
consumption within the network. There is also an
improvement in the throughput which results in providing
better QoS and which further results in increasing the
lifetime of the network. For the purpose of evaluating and
comparing the performance of both the routing protocols,
the computation model is used.
Guangjie Han, et.al (2015) proposed in this paper [11], that
for various underwater applications, the underwater WSNs
(UWSNs) are being used a lot. For the purpose of data
transmission and other real-time applications, the energy
efficient routing protocol is very important. There are some
special characteristics of UWSNs which include dynamic
structure, high energy consumption, as well as high latency.
These properties have made it difficult to build certain
routing protocols for this network. The already existing
routing protocols are to be studied in this paper and their
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2380
performances are to be comparedwithrespecttoeachother.
The routing protocols are classified into two categories on
the basis of the route decision maker they use. The results
have shown that there are still many enhancements to be
made in this technology. In the future work, new
technologies are to be evolved to provide better results.
Lein Harn, et.al (2016) proposed in this paper [12], a novel
design of secure end-to-end data communication. A newly
designed group key pre-distribution method is proposed
here which provides a unique groupkeywhichisalsoknown
as the path key This key is used for protecting the
transmitted data which is present in the complete routing
path. There are many pairwise shared keys used in repeated
form for the purpose of encryption and decryption in the
network. To avoid repetitive use,theuniqueend-to-endpath
key is proposed here which protects the data which is
transmitted across the network. The sensors can be
authenticated using this protocol for the purpose of
establishing path as well as the path key. Through this
protocol, the time which is needed to process data through
intermediate nodes is reduced, which is an important
advantage here.
JingJing Yan, et.al (2016) proposed in this paper [13], that it
is very important to increase the lifetime of a network due to
the limited battery available in the sensors. For this purpose
the energy-efficient routingtechniquesareverywidelyused.
The routing protocols that are already proposed are studied
and classified into homogeneous and heterogeneous
categories as per their orientations. Also the static and
mobile protocols are classified accordingly. The
characteristic properties, limitation as well as applications
are also discussed. The various issues which are related to
the energy-efficiency of the routing protocol designs are
enlisted here. The mobile WSNs provide more enhanced
results as compared to the static WSNs which result in
improvement in terms of energy efficiency, energy balance,
and higher coverage. The implementations as well as the
deployment costs increase however, in these types of
networks.
Author Name Year Description Outcomes
Sarab F. Al Rubeaai, Mehmmood
A. Abd, Brajendra K. Singh, Kemal
E. Tepe
2015 In this paper, a novel 3D real-time
geographical routing protocol
(3DRTGP) for WSNs. The numbers
of forwarding nodes within the
network are controlled by this
protocol.
With respect to the end-t-end delay and
miss ration parameters, this protocol has
shown better performance than theother
routing protocols.
Adnan Ahmed,
Kamalrulnizam Abu Bakar,
Muhammad Ibrahim Channa,
Khalid HaseebandAbdul Waheed
Khan,”
2015 A Trust and Energy aware Routing
Protocol (TERP) for the purpose of
detection and isolation of
malicious nodes. The energy
consumption amongst the trusted
nodes is balanced when the
routing data utilizes the shorter
paths with the help of this routing
strategy.
According to the simulation results
achieved there is a reduction in the
energy consumption, enhancement inthe
throughput as well as lifetime of the
network when the TERP is used as
compared to other protocols.
Gurbinder Singh Brar, ShalliRani,
Vinay Chopra, Rahul Malhotra,
Houbing Song, Syed Hassan
Ahmed
2016 A directional transmission based
energy aware routing protocol
named as PDORP is proposed. The
properties of Power Efficient
Gathering Sensor Information
System (PEGASIS)andDSRrouting
protocols are combined in this
newly proposed protocol.
There is also an improvement in the
throughput which results in providing
better QoS and which further results in
increasing the lifetime of the network.
Guangjie Han, Jinfang Jiang, Na
Bao, Liangtian Wan, and Mohsen
Guizani
2015 For the purpose of data
transmission and other real-time
applications, the energy efficient
routing protocol is very important.
There are some special
characteristics of UWSNs which
include dynamic structure, high
energy consumption, as well as
high latency.
The results have shown that therearestill
many enhancements to be made in this
technology. In the future work, new
technologies are to be evolved to provide
better results.
Table -1: Routing Protocols of WSN
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2381
Lein Harn, Ching-Fang Hsu, Ou
Ruan, and Mao-Yuan Zhang
2016 A novel design of secure end-to-
end data communication is
proposed. A newly designed group
key pre-distribution method is
proposed here which provides a
unique group key which is also
known as the path key.
Through this protocol, the time which is
needed to process data through
intermediate nodes is reduced, which is
an important advantage here.
JingJing Yan, MengChu Zhou, and
ZhiJun Ding
2016 The routing protocols that are
already proposed are studied and
classified into homogeneous and
heterogeneous categories as per
their orientations.
The mobile WSNsprovidemore enhanced
results as compared to the static WSNs
which result in improvement in terms of
energy efficiency, energy balance, and
higher coverage.
Table -2: Security Techniques for MANETs
Name Year Description Outcomes
Jian-Ming Chang, Po-Chun Tsou,
Isaac Woungang, Han-Chieh Chao,
and Chin-Feng Lai
2015 A Dynamic Source Routing (DSR)-
based routing mechanismisusedinthis
paper to resolve these issues. It is
known as the Cooperative Bait
Detection Scheme (CBDS).
This technique inherits the
advantages of both proactive and
reactive defense architectures and
the results achieved show that the
outcomes vary according to the
presence or absence of malicious
nodes in the network.
Adnan Nadeem, and Michael P.
Howarth
2013 A survey of various attacks is presentin
the paper and further the intrusion
detection as well as protection
mechanisms are reviewed.
The results evaluated show the
properties of both of these
techniques and their applications are
defined accordingly. The further
research areas are identified at the
end.
Ming Yu, Mengchu Zhou 2009 An optimal routing algorithm along
with the routing metricisalsoproposed
in this paper whichcombinesthenode’s
trustworthiness and performance
properties.
The advantages of the proposed
attack detection and routing
algorithm can be seen in the
simulation results derived. The
comparisons are made with some
already known protocols to show the
enhancements made in this work.
Sohail Abbas, MadjidMerabti,David
Llewellyn-Jones, and Kashif Kifayat
2012 A new lightweight scheme is proposed
here, which helps in detecting the new
identities of Sybil attackers.Thisistobe
done without using the centralized
trusted third party or any extra
hardware like geographical positioning
or directional antenna etc.
Many extensive simulations andreal-
world testbed experiments are
presented and it is concluded this
method detects the Sybil identities
with good accuracy even when
mobility is seen in the network.
Bounpadith Kannhavong, Hidehisa
Nakayama, Yoshiaki Nemoto, Nei
Kato, Abbas Jamalipour
2007 In this paper, all the possible attacksare
discussed in details and their state-of-
the-art of security issues are discussed.
The routing attacks such as link
spoofing and colluding misrelay
attacks are studied well. Also, the
ways to prevent or remove such
attack from the network are
proposed in the existing MANET
protocols.
Yingbin Liang, H. Vincent Poor, and
Lei Ying
2011 There are n number of legitimate
mobile nodes and m number of
malicious nodes in the MANET. Alsothe
The active attacks need to satisfy
more stringent conditions on the
number of malicious nodes than the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2382
delay constraint D is used for the
transmission between the legitimate
nodes.
passive attacks for achieving same
throughput.
Ziming Zhao, Hongxin Hu, Gail-Joon
Ahn, and Ruoyu Wu
2012 In this paper, to handle the various
routing attacks in a systematic manner,
a risk-aware response mechanism is
proposed. This approachisbasedonthe
extended Dempster-Shafer
mathematical theory of evidences.
This method introduces a notion
which enlists the important factors
required. The experiments achieved
show the effectiveness of this
proposed approach on the basis of
certain performance metrics.
3. CONCLUSIONS
In this work, it is been concluded that wireless sensor
network is the network in which security and energy
consumption is the major issue . In the recent times, various
techniques has been proposed to increase lifetime of the
network. In this work, energy efficient techniques has been
reviewed and discussed in termsofdescriptionandoutcome
The techniques which are proposed in the recent times to
increase security of Adhoc networks are also discussed
REFERENCES
[1] G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K.
Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, andW.
Hong, “A macroscope in the redwoods,” 2005, 3rd ACM
SenSys, New York, NY, USA, pp. 51–63
[2] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M.
Welsh, USENIX Association, “Fidelity and yield in a volcano
monitoring sensor network,” 2006, 7th OSDI, Berkeley, CA,
USA, pp. 381–396
[3] M. Li and Y. Liu, “Undergroundcoal mine monitoring with
wireless sensor networks,” 2009, ACMTrans.Sen.Netw., vol.
5, pp. 10:1–10:29
[4] P. Vicaire, T. He,Q.Cao, T.Yan,G. Zhou, L.Gu, L. Luo, R.
Stoleru, J. A. Stankovic, and T. F.Abdelzaher,“Achievinglong-
term surveillance in VigilNet,” 2009, ACM Trans. Sen. Netw.,
vol. 5, pp. 9:1–9:39
[5] N. Xu, S. Rangwala, K. K. Chintalapudi, D. Ganesan, A.
Broad, R. Govindan, and D. Estrin, “A wireless sensor
network for structural monitoring,” 2004, 2nd ACM SenSys,
New York, NY, USA, pp. 13–24
[6] L. Liu, X. Zhang, and H. Ma, “Optimal node selection for
target localization in wireless camera sensor networks,”
2010, IEEE Trans. Veh Technol., vol.59,no.7,pp.3562–3576
[7] Y. Weng, W. Xiao, and L. Xie, “Sensor selection for
parameterized random field estimation in wireless sensor
networks,” 2011, J. Control Theory Appl., vol. 9, pp. 44–50
[8] Sarab F. Al Rubeaai, Mehmmood A. Abd, Brajendra K.
Singh, Kemal E. Tepe,” 3D Real-Time Routing Protocol with
Tunable Parameters for Wireless Sensor Networks”, 2015,
IEEE Sensors Journal
[9] Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad
Ibrahim Channa, Khalid Haseeb and Abdul Waheed Khan,”
TERP: A Trust and Energy Aware Routing Protocol for
Wireless Sensor Network”, 2015, IEEE
[10] Gurbinder Singh Brar, Shalli Rani, Vinay Chopra, Rahul
Malhotra, Houbing Song, Syed Hassan Ahmed,” Energy
Efficient Direction BasedPDORPRoutingProtocol ForWSN”,
2016, IEEE
[11] Guangjie Han, Jinfang Jiang, Na Bao, Liangtian Wan, and
MohsenGuizani,”Routing ProtocolsforUnderwater Wireless
Sensor Networks”, 2015, IEEE
[12] Lein Harn, Ching-Fang Hsu, Ou Ruan, and Mao-Yuan
Zhang,” Novel Design of Secure End-to-EndRoutingProtocol
in Wireless Sensor Networks”, 2016, IEEE SENSORS
JOURNAL, Vol. 16, No. 6
[13] JingJing Yan, MengChu Zhou, and ZhiJun Ding,” Recent
Advances in Energy-efficient Routing Protocols for Wireless
Sensor Networks: A Review”, 2016, IEEE

More Related Content

What's hot

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networksRushin Shah
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocolsRushin Shah
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network Dr Praveen Jain
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Abid Afsar Khan Malang Falsafi
 

What's hot (19)

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wsn
WsnWsn
Wsn
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networks
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocols
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
 

Similar to IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONIRJET Journal
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET Journal
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 

Similar to IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks (20)

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
Aodv
AodvAodv
Aodv
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378 A REVIEW PAPER ON ENERGY EFFICIENT TECHNIQUE OF WIRELESS SENSOR NETWORKS Heena1, Simranjit kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India 2Assistant professor, Dept. of electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The wireless sensor networks isthetypeofnetwork in which sensor nodes sense the environmental conditionsand pass the sensed information to the basestation. Thenetworkis deployed on the far places and size of the sensor nodes are very small due to battery power of the nodes is limited. Due to far deployment of the network, it is very difficult to recharge or replace battery of the nodes. The Mobile adhoc network is also decentralized type of network in which no central controller is present due to which security attacksarepossible in the network In the recent times, various techniques has been proposed which reduce energy consumption of the network. In this paper, various energy efficient techniques of wireless sensor networks is been reviewed and discussed and various security techniques for mobile adhoc network are discussed Key Words: WSN,Leach,Clustering 1. INTRODUCTION There are large numbers of applications of wireless sensor networks due to their various properties. There are a lot of benefits of these types of networks which are the reason of their increasing demands. Wireless sensor networksconsist of sensor nodes which are small in size, cheap, and also have self-contained battery powered systems [1]. The input received from adjacent sensor is processed by the sensor nodes. Further, the result is transmitted to transit network within the network. The WSNs are used to monitor the surroundings of area in which they areplacedandgather the important information according to the physical parameters such as pressure, temperature, etc. They are dispersed type of networks which have lightweight, small sensor nodes. There is limited power, memory as well as computational capacity in each sensor node [2]. There are various resource constraints such as limited amount of energy, low bandwidth, storage and limited processing present within each node of a WSN. There a certain design constraints as well, which are completely application dependent and are also based on the monitored environment. It completely depends on the surroundings to define the deployment scheme, network topology as well as the size determination of the network [3]. There are few nodes required for the internal environments where as a large numberof nodesare required for the purpose of external environments. The sensor nodes of a network can communicatewitheachother or also with the external base stations of a network. The important part of a sensor node is the battery which is very important as it affects the network’s lifetime directly [4]. There are various energy-optimized solutions proposed at various levels of the system for improving the battery consumptions of sensor nodes.Thecommunicationamongst the sensor nodes is done with the helpofradiosignals.There are various applications which use WSN and also include non-conventional paradigms which help in protocol design which involve various constraints. For the purpose of path determination from the source to the destination node, the routing method is utilized. There are various categories according to which the routing protocols are classified. The reactive and proactive are one of the types of classifications of routing protocols. Before the demand of a routing traffic the routing paths as well as the states are provided in the network using the proactive routing protocols [5]. The protocols which trigger the routing actions when the data is to be sent to various nodes is known as the reactive routing protocol. On the basis of their initiation which is source- initiation (Src-initiated) or destination initiation (Dst- initiated) the routing protocolsareclassified.Onthedemand of source node, the source-initiated protocol provides the routing path which begins from thesourcenode. Therouting path is initiated from the destination node in case of destination-initiated protocol [6]. On the basis of the sensor network architecturealsotheroutingprotocolsareclassified which are the homogeneous nodes as well as the heterogeneous nodes. The protocols can also be here classified further on the basis of the topology theyuse which is mainly the flat topology or the hierarchical topology. The protocols in which the sensor nodes are addressedusingthe locations are known as the location-based protocol. For the purpose of calculating the distance between two specific nodes, the location information of nodes is required by the network. This also helps in estimating the energy consumption of the node [7]. The Geographic Adaptive Fidelity (GAF) is an energy-aware routing protocol which is used for the purpose of energy conservation mainly. 1.1 Attacks in Adhoc networks 1.1.1. Black hole Attack: In this attack, an attacker advertises a zero metric for all destinations bringing about all nodes around it to route packets towards it. A malicious hub sends fake routing information, asserting that it has an optimum route and causes other good nodes to route data packets through the malicious one. A malicioushubdropsall packets that it receives instead ofnormallyforwardingthose
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379 packets. An attacker listen the solicitations in a flooding based convention [3]. 1.1.2. Wormhole Attack: In a wormhole attack, an attacker receives packets at one point in the network, "tunnels"them to another point in the network, and after that replays them into the network starting there. Routing can be disrupted when routing control message are tunneled. This tunnel between two colluding attacks is known as a wormhole. In DSR, AODV this attack could prevent discovery of anyroutes and may make a wormhole even for parcel not address to itself as a result of broadcasting. Wormholes are hard to detect on the grounds that the path that is utilized to passon information is typically not part of the actual network. Wormholes are dangerous on the grounds that they can do damage without even knowing the network. 1.1.3. Byzantine attack: A compromised with set of intermediate, or intermediate nodes that working alone inside network do attacks, for example, making routing loops, forwarding packets through non - ideal paths or specifically dropping packets which brings about disruption or degradation of routing services inside the network [4]. 1.1.4.Rushing attack: Two colluded attackers utilize the tunnel procedure to shape a wormhole. On the off chance that a fast transmission path (e.g.a dedicatedchannel shared by attackers) exists between the two closures of the wormhole, the tunneled packets can propagate faster than those through a normal multi-hop route. 1.1.5. Traffic Monitoring: It can be developed to identify the communication parties and functionality which could give information to launch additionally attacks .It is not particular to MANET, different wireless network, for example, cellular, satellite and WLAN likewise suffer from these potential vulnerabilities [5]. 1.1.6. Eavesdropping: The term eavesdrops implies overhearing without expending any expending any additional effort. In this intercepting and reading and conversation of message by unintended beneficiary occur. Portable host in versatile specially appointed network shares a wireless medium. Majorities of wireless communication utilizeRF rangeandcommunicateby nature. Message transmitted can beeavesdroppedandfakemessage can be infused into network. 1.1.7. Denial of service attack: Denial ofserviceattacksare gone for complete disruption of routing information and accordingly the whole operation of specially appointed network [6]. 1.1.8. Gray-hole attack: This attack is otherwise called routing misbehavior attack which leads to dropping of messages. Dark hole attack has two phases. In the main phase the hub advertise itself as having a valid route to destination while in second phase, nodes drops captured packets with a specific probability. 2. LITERATURE REVIEW Sarab F. Al Rubeaai, et.al (2015) proposed in this paper, [8], a novel 3D real-time geographical routing protocol (3DRTGP) for WSNs. The numbers of forwarding nodes within the network are controlled by this protocol. This is done by limiting the forwarding to a unique packet forwarding region (PFR). Under the different network densities and traffic load conditions, the performanceofthis protocol is evaluated by performing certainsimulations.The needs of real-time applications are fulfilled with the help of the network tuning parameters that are provided by the results. Within the 3D deployments, the Void Node Problem (VNP) is solved by the 3DRTGP heuristically. Even when there is no network partitioning, the 3DRTGP helps is resolving the VNP. With respect to the end-t-end delay and miss ration parameters, this protocol has shown better performance than the other routing protocols. Adnan Ahmed, et.al (2015) proposed in this paper [9], a Trust and Energy aware Routing Protocol (TERP). For the purpose of detection and isolation of malicious nodes, this distributed trust model isused.Acompositeroutingfunction is included in TERP which provides trust, residual-energy as well as hop counts of neighboring nodes which will further help in taking therouting decisions.Theenergyconsumption amongst the trusted nodesis balancedwhentheroutingdata utilizes the shorter paths with the help of this routing strategy. According to the simulation results achieved there is a reduction in the energy consumption, enhancement in the throughput as well as lifetime of the network when the TERP is used as compared to other protocols. Gurbinder Singh Brar, et.al (2016) proposed in this paper [10], a directional transmission based energy aware routing protocol named as PDORP is proposed. The properties of Power Efficient Gathering Sensor Information System (PEGASIS) and DSR routing protocols are combined in this newly proposed protocol. A comparison in between the hybridization approach and the newly proposedapproachis given. The performance analysis shows that there is a reduction in the bit error rate, delay and energy consumption within the network. There is also an improvement in the throughput which results in providing better QoS and which further results in increasing the lifetime of the network. For the purpose of evaluating and comparing the performance of both the routing protocols, the computation model is used. Guangjie Han, et.al (2015) proposed in this paper [11], that for various underwater applications, the underwater WSNs (UWSNs) are being used a lot. For the purpose of data transmission and other real-time applications, the energy efficient routing protocol is very important. There are some special characteristics of UWSNs which include dynamic structure, high energy consumption, as well as high latency. These properties have made it difficult to build certain routing protocols for this network. The already existing routing protocols are to be studied in this paper and their
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2380 performances are to be comparedwithrespecttoeachother. The routing protocols are classified into two categories on the basis of the route decision maker they use. The results have shown that there are still many enhancements to be made in this technology. In the future work, new technologies are to be evolved to provide better results. Lein Harn, et.al (2016) proposed in this paper [12], a novel design of secure end-to-end data communication. A newly designed group key pre-distribution method is proposed here which provides a unique groupkeywhichisalsoknown as the path key This key is used for protecting the transmitted data which is present in the complete routing path. There are many pairwise shared keys used in repeated form for the purpose of encryption and decryption in the network. To avoid repetitive use,theuniqueend-to-endpath key is proposed here which protects the data which is transmitted across the network. The sensors can be authenticated using this protocol for the purpose of establishing path as well as the path key. Through this protocol, the time which is needed to process data through intermediate nodes is reduced, which is an important advantage here. JingJing Yan, et.al (2016) proposed in this paper [13], that it is very important to increase the lifetime of a network due to the limited battery available in the sensors. For this purpose the energy-efficient routingtechniquesareverywidelyused. The routing protocols that are already proposed are studied and classified into homogeneous and heterogeneous categories as per their orientations. Also the static and mobile protocols are classified accordingly. The characteristic properties, limitation as well as applications are also discussed. The various issues which are related to the energy-efficiency of the routing protocol designs are enlisted here. The mobile WSNs provide more enhanced results as compared to the static WSNs which result in improvement in terms of energy efficiency, energy balance, and higher coverage. The implementations as well as the deployment costs increase however, in these types of networks. Author Name Year Description Outcomes Sarab F. Al Rubeaai, Mehmmood A. Abd, Brajendra K. Singh, Kemal E. Tepe 2015 In this paper, a novel 3D real-time geographical routing protocol (3DRTGP) for WSNs. The numbers of forwarding nodes within the network are controlled by this protocol. With respect to the end-t-end delay and miss ration parameters, this protocol has shown better performance than theother routing protocols. Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid HaseebandAbdul Waheed Khan,” 2015 A Trust and Energy aware Routing Protocol (TERP) for the purpose of detection and isolation of malicious nodes. The energy consumption amongst the trusted nodes is balanced when the routing data utilizes the shorter paths with the help of this routing strategy. According to the simulation results achieved there is a reduction in the energy consumption, enhancement inthe throughput as well as lifetime of the network when the TERP is used as compared to other protocols. Gurbinder Singh Brar, ShalliRani, Vinay Chopra, Rahul Malhotra, Houbing Song, Syed Hassan Ahmed 2016 A directional transmission based energy aware routing protocol named as PDORP is proposed. The properties of Power Efficient Gathering Sensor Information System (PEGASIS)andDSRrouting protocols are combined in this newly proposed protocol. There is also an improvement in the throughput which results in providing better QoS and which further results in increasing the lifetime of the network. Guangjie Han, Jinfang Jiang, Na Bao, Liangtian Wan, and Mohsen Guizani 2015 For the purpose of data transmission and other real-time applications, the energy efficient routing protocol is very important. There are some special characteristics of UWSNs which include dynamic structure, high energy consumption, as well as high latency. The results have shown that therearestill many enhancements to be made in this technology. In the future work, new technologies are to be evolved to provide better results. Table -1: Routing Protocols of WSN
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2381 Lein Harn, Ching-Fang Hsu, Ou Ruan, and Mao-Yuan Zhang 2016 A novel design of secure end-to- end data communication is proposed. A newly designed group key pre-distribution method is proposed here which provides a unique group key which is also known as the path key. Through this protocol, the time which is needed to process data through intermediate nodes is reduced, which is an important advantage here. JingJing Yan, MengChu Zhou, and ZhiJun Ding 2016 The routing protocols that are already proposed are studied and classified into homogeneous and heterogeneous categories as per their orientations. The mobile WSNsprovidemore enhanced results as compared to the static WSNs which result in improvement in terms of energy efficiency, energy balance, and higher coverage. Table -2: Security Techniques for MANETs Name Year Description Outcomes Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai 2015 A Dynamic Source Routing (DSR)- based routing mechanismisusedinthis paper to resolve these issues. It is known as the Cooperative Bait Detection Scheme (CBDS). This technique inherits the advantages of both proactive and reactive defense architectures and the results achieved show that the outcomes vary according to the presence or absence of malicious nodes in the network. Adnan Nadeem, and Michael P. Howarth 2013 A survey of various attacks is presentin the paper and further the intrusion detection as well as protection mechanisms are reviewed. The results evaluated show the properties of both of these techniques and their applications are defined accordingly. The further research areas are identified at the end. Ming Yu, Mengchu Zhou 2009 An optimal routing algorithm along with the routing metricisalsoproposed in this paper whichcombinesthenode’s trustworthiness and performance properties. The advantages of the proposed attack detection and routing algorithm can be seen in the simulation results derived. The comparisons are made with some already known protocols to show the enhancements made in this work. Sohail Abbas, MadjidMerabti,David Llewellyn-Jones, and Kashif Kifayat 2012 A new lightweight scheme is proposed here, which helps in detecting the new identities of Sybil attackers.Thisistobe done without using the centralized trusted third party or any extra hardware like geographical positioning or directional antenna etc. Many extensive simulations andreal- world testbed experiments are presented and it is concluded this method detects the Sybil identities with good accuracy even when mobility is seen in the network. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Abbas Jamalipour 2007 In this paper, all the possible attacksare discussed in details and their state-of- the-art of security issues are discussed. The routing attacks such as link spoofing and colluding misrelay attacks are studied well. Also, the ways to prevent or remove such attack from the network are proposed in the existing MANET protocols. Yingbin Liang, H. Vincent Poor, and Lei Ying 2011 There are n number of legitimate mobile nodes and m number of malicious nodes in the MANET. Alsothe The active attacks need to satisfy more stringent conditions on the number of malicious nodes than the
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2382 delay constraint D is used for the transmission between the legitimate nodes. passive attacks for achieving same throughput. Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu 2012 In this paper, to handle the various routing attacks in a systematic manner, a risk-aware response mechanism is proposed. This approachisbasedonthe extended Dempster-Shafer mathematical theory of evidences. This method introduces a notion which enlists the important factors required. The experiments achieved show the effectiveness of this proposed approach on the basis of certain performance metrics. 3. CONCLUSIONS In this work, it is been concluded that wireless sensor network is the network in which security and energy consumption is the major issue . In the recent times, various techniques has been proposed to increase lifetime of the network. In this work, energy efficient techniques has been reviewed and discussed in termsofdescriptionandoutcome The techniques which are proposed in the recent times to increase security of Adhoc networks are also discussed REFERENCES [1] G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, andW. Hong, “A macroscope in the redwoods,” 2005, 3rd ACM SenSys, New York, NY, USA, pp. 51–63 [2] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M. Welsh, USENIX Association, “Fidelity and yield in a volcano monitoring sensor network,” 2006, 7th OSDI, Berkeley, CA, USA, pp. 381–396 [3] M. Li and Y. Liu, “Undergroundcoal mine monitoring with wireless sensor networks,” 2009, ACMTrans.Sen.Netw., vol. 5, pp. 10:1–10:29 [4] P. Vicaire, T. He,Q.Cao, T.Yan,G. Zhou, L.Gu, L. Luo, R. Stoleru, J. A. Stankovic, and T. F.Abdelzaher,“Achievinglong- term surveillance in VigilNet,” 2009, ACM Trans. Sen. Netw., vol. 5, pp. 9:1–9:39 [5] N. Xu, S. Rangwala, K. K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, and D. Estrin, “A wireless sensor network for structural monitoring,” 2004, 2nd ACM SenSys, New York, NY, USA, pp. 13–24 [6] L. Liu, X. Zhang, and H. Ma, “Optimal node selection for target localization in wireless camera sensor networks,” 2010, IEEE Trans. Veh Technol., vol.59,no.7,pp.3562–3576 [7] Y. Weng, W. Xiao, and L. Xie, “Sensor selection for parameterized random field estimation in wireless sensor networks,” 2011, J. Control Theory Appl., vol. 9, pp. 44–50 [8] Sarab F. Al Rubeaai, Mehmmood A. Abd, Brajendra K. Singh, Kemal E. Tepe,” 3D Real-Time Routing Protocol with Tunable Parameters for Wireless Sensor Networks”, 2015, IEEE Sensors Journal [9] Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb and Abdul Waheed Khan,” TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network”, 2015, IEEE [10] Gurbinder Singh Brar, Shalli Rani, Vinay Chopra, Rahul Malhotra, Houbing Song, Syed Hassan Ahmed,” Energy Efficient Direction BasedPDORPRoutingProtocol ForWSN”, 2016, IEEE [11] Guangjie Han, Jinfang Jiang, Na Bao, Liangtian Wan, and MohsenGuizani,”Routing ProtocolsforUnderwater Wireless Sensor Networks”, 2015, IEEE [12] Lein Harn, Ching-Fang Hsu, Ou Ruan, and Mao-Yuan Zhang,” Novel Design of Secure End-to-EndRoutingProtocol in Wireless Sensor Networks”, 2016, IEEE SENSORS JOURNAL, Vol. 16, No. 6 [13] JingJing Yan, MengChu Zhou, and ZhiJun Ding,” Recent Advances in Energy-efficient Routing Protocols for Wireless Sensor Networks: A Review”, 2016, IEEE