Submit Search
Upload
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
•
1 like
•
45 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i6/IRJET-V5I6444.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET Journal
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
IOSR Journals
Attacks in MANET
Attacks in MANET
Sunita Sahu
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
International Journal of Technical Research & Application
Protocol manet
Protocol manet
Kunal Prajapati
Blackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
Presentation1
Presentation1
Rajat Soni
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
Recommended
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET Journal
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
IOSR Journals
Attacks in MANET
Attacks in MANET
Sunita Sahu
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
International Journal of Technical Research & Application
Protocol manet
Protocol manet
Kunal Prajapati
Blackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
Presentation1
Presentation1
Rajat Soni
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
ijasuc
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
Deepika,Assistant Professor,PES College of Engineering ,Mandya
A review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
Rushin Shah
Threats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
Routing protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Editor Jacotech
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
IJNSA Journal
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
WSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
Routing Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
Wsn
Wsn
nishantshah2381
Localization & management of sensor networks
Localization & management of sensor networks
Rushin Shah
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
Wireless sensors networks protocols
Wireless sensors networks protocols
Rushin Shah
Wireless Sensor Network
Wireless Sensor Network
Dr Praveen Jain
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
Rushin Shah
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Abid Afsar Khan Malang Falsafi
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
IRJET Journal
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
More Related Content
What's hot
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
ijasuc
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
Deepika,Assistant Professor,PES College of Engineering ,Mandya
A review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
Rushin Shah
Threats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
Routing protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Editor Jacotech
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
IJNSA Journal
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
WSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
Routing Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
Wsn
Wsn
nishantshah2381
Localization & management of sensor networks
Localization & management of sensor networks
Rushin Shah
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
Wireless sensors networks protocols
Wireless sensors networks protocols
Rushin Shah
Wireless Sensor Network
Wireless Sensor Network
Dr Praveen Jain
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
Rushin Shah
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Abid Afsar Khan Malang Falsafi
What's hot
(19)
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
A review of routing protocols in wsn
A review of routing protocols in wsn
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
Threats in wireless sensor networks
Threats in wireless sensor networks
Routing protocol on wireless sensor network
Routing protocol on wireless sensor network
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
WSN Routing Protocols
WSN Routing Protocols
Routing Protocols in WSN
Routing Protocols in WSN
Wsn
Wsn
Localization & management of sensor networks
Localization & management of sensor networks
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Wireless sensors networks protocols
Wireless sensors networks protocols
Wireless Sensor Network
Wireless Sensor Network
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Similar to IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
IRJET Journal
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
IRJET Journal
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
IJCSEA Journal
Security threats in manets a review
Security threats in manets a review
ijitjournal
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
ijasuc
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
eSAT Publishing House
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET Journal
Md ux mza5mtg=14
Md ux mza5mtg=14
editorijserin
Aodv
Aodv
Akshita Sharma
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
IRJET Journal
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
eSAT Publishing House
Improvement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
nooriasukmaningtyas
Similar to IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
(20)
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Security threats in manets a review
Security threats in manets a review
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
Md ux mza5mtg=14
Md ux mza5mtg=14
Aodv
Aodv
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Improvement of quality of service parameters using
Improvement of quality of service parameters using
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378 A REVIEW PAPER ON ENERGY EFFICIENT TECHNIQUE OF WIRELESS SENSOR NETWORKS Heena1, Simranjit kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India 2Assistant professor, Dept. of electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani), Punjab,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The wireless sensor networks isthetypeofnetwork in which sensor nodes sense the environmental conditionsand pass the sensed information to the basestation. Thenetworkis deployed on the far places and size of the sensor nodes are very small due to battery power of the nodes is limited. Due to far deployment of the network, it is very difficult to recharge or replace battery of the nodes. The Mobile adhoc network is also decentralized type of network in which no central controller is present due to which security attacksarepossible in the network In the recent times, various techniques has been proposed which reduce energy consumption of the network. In this paper, various energy efficient techniques of wireless sensor networks is been reviewed and discussed and various security techniques for mobile adhoc network are discussed Key Words: WSN,Leach,Clustering 1. INTRODUCTION There are large numbers of applications of wireless sensor networks due to their various properties. There are a lot of benefits of these types of networks which are the reason of their increasing demands. Wireless sensor networksconsist of sensor nodes which are small in size, cheap, and also have self-contained battery powered systems [1]. The input received from adjacent sensor is processed by the sensor nodes. Further, the result is transmitted to transit network within the network. The WSNs are used to monitor the surroundings of area in which they areplacedandgather the important information according to the physical parameters such as pressure, temperature, etc. They are dispersed type of networks which have lightweight, small sensor nodes. There is limited power, memory as well as computational capacity in each sensor node [2]. There are various resource constraints such as limited amount of energy, low bandwidth, storage and limited processing present within each node of a WSN. There a certain design constraints as well, which are completely application dependent and are also based on the monitored environment. It completely depends on the surroundings to define the deployment scheme, network topology as well as the size determination of the network [3]. There are few nodes required for the internal environments where as a large numberof nodesare required for the purpose of external environments. The sensor nodes of a network can communicatewitheachother or also with the external base stations of a network. The important part of a sensor node is the battery which is very important as it affects the network’s lifetime directly [4]. There are various energy-optimized solutions proposed at various levels of the system for improving the battery consumptions of sensor nodes.Thecommunicationamongst the sensor nodes is done with the helpofradiosignals.There are various applications which use WSN and also include non-conventional paradigms which help in protocol design which involve various constraints. For the purpose of path determination from the source to the destination node, the routing method is utilized. There are various categories according to which the routing protocols are classified. The reactive and proactive are one of the types of classifications of routing protocols. Before the demand of a routing traffic the routing paths as well as the states are provided in the network using the proactive routing protocols [5]. The protocols which trigger the routing actions when the data is to be sent to various nodes is known as the reactive routing protocol. On the basis of their initiation which is source- initiation (Src-initiated) or destination initiation (Dst- initiated) the routing protocolsareclassified.Onthedemand of source node, the source-initiated protocol provides the routing path which begins from thesourcenode. Therouting path is initiated from the destination node in case of destination-initiated protocol [6]. On the basis of the sensor network architecturealsotheroutingprotocolsareclassified which are the homogeneous nodes as well as the heterogeneous nodes. The protocols can also be here classified further on the basis of the topology theyuse which is mainly the flat topology or the hierarchical topology. The protocols in which the sensor nodes are addressedusingthe locations are known as the location-based protocol. For the purpose of calculating the distance between two specific nodes, the location information of nodes is required by the network. This also helps in estimating the energy consumption of the node [7]. The Geographic Adaptive Fidelity (GAF) is an energy-aware routing protocol which is used for the purpose of energy conservation mainly. 1.1 Attacks in Adhoc networks 1.1.1. Black hole Attack: In this attack, an attacker advertises a zero metric for all destinations bringing about all nodes around it to route packets towards it. A malicious hub sends fake routing information, asserting that it has an optimum route and causes other good nodes to route data packets through the malicious one. A malicioushubdropsall packets that it receives instead ofnormallyforwardingthose
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379 packets. An attacker listen the solicitations in a flooding based convention [3]. 1.1.2. Wormhole Attack: In a wormhole attack, an attacker receives packets at one point in the network, "tunnels"them to another point in the network, and after that replays them into the network starting there. Routing can be disrupted when routing control message are tunneled. This tunnel between two colluding attacks is known as a wormhole. In DSR, AODV this attack could prevent discovery of anyroutes and may make a wormhole even for parcel not address to itself as a result of broadcasting. Wormholes are hard to detect on the grounds that the path that is utilized to passon information is typically not part of the actual network. Wormholes are dangerous on the grounds that they can do damage without even knowing the network. 1.1.3. Byzantine attack: A compromised with set of intermediate, or intermediate nodes that working alone inside network do attacks, for example, making routing loops, forwarding packets through non - ideal paths or specifically dropping packets which brings about disruption or degradation of routing services inside the network [4]. 1.1.4.Rushing attack: Two colluded attackers utilize the tunnel procedure to shape a wormhole. On the off chance that a fast transmission path (e.g.a dedicatedchannel shared by attackers) exists between the two closures of the wormhole, the tunneled packets can propagate faster than those through a normal multi-hop route. 1.1.5. Traffic Monitoring: It can be developed to identify the communication parties and functionality which could give information to launch additionally attacks .It is not particular to MANET, different wireless network, for example, cellular, satellite and WLAN likewise suffer from these potential vulnerabilities [5]. 1.1.6. Eavesdropping: The term eavesdrops implies overhearing without expending any expending any additional effort. In this intercepting and reading and conversation of message by unintended beneficiary occur. Portable host in versatile specially appointed network shares a wireless medium. Majorities of wireless communication utilizeRF rangeandcommunicateby nature. Message transmitted can beeavesdroppedandfakemessage can be infused into network. 1.1.7. Denial of service attack: Denial ofserviceattacksare gone for complete disruption of routing information and accordingly the whole operation of specially appointed network [6]. 1.1.8. Gray-hole attack: This attack is otherwise called routing misbehavior attack which leads to dropping of messages. Dark hole attack has two phases. In the main phase the hub advertise itself as having a valid route to destination while in second phase, nodes drops captured packets with a specific probability. 2. LITERATURE REVIEW Sarab F. Al Rubeaai, et.al (2015) proposed in this paper, [8], a novel 3D real-time geographical routing protocol (3DRTGP) for WSNs. The numbers of forwarding nodes within the network are controlled by this protocol. This is done by limiting the forwarding to a unique packet forwarding region (PFR). Under the different network densities and traffic load conditions, the performanceofthis protocol is evaluated by performing certainsimulations.The needs of real-time applications are fulfilled with the help of the network tuning parameters that are provided by the results. Within the 3D deployments, the Void Node Problem (VNP) is solved by the 3DRTGP heuristically. Even when there is no network partitioning, the 3DRTGP helps is resolving the VNP. With respect to the end-t-end delay and miss ration parameters, this protocol has shown better performance than the other routing protocols. Adnan Ahmed, et.al (2015) proposed in this paper [9], a Trust and Energy aware Routing Protocol (TERP). For the purpose of detection and isolation of malicious nodes, this distributed trust model isused.Acompositeroutingfunction is included in TERP which provides trust, residual-energy as well as hop counts of neighboring nodes which will further help in taking therouting decisions.Theenergyconsumption amongst the trusted nodesis balancedwhentheroutingdata utilizes the shorter paths with the help of this routing strategy. According to the simulation results achieved there is a reduction in the energy consumption, enhancement in the throughput as well as lifetime of the network when the TERP is used as compared to other protocols. Gurbinder Singh Brar, et.al (2016) proposed in this paper [10], a directional transmission based energy aware routing protocol named as PDORP is proposed. The properties of Power Efficient Gathering Sensor Information System (PEGASIS) and DSR routing protocols are combined in this newly proposed protocol. A comparison in between the hybridization approach and the newly proposedapproachis given. The performance analysis shows that there is a reduction in the bit error rate, delay and energy consumption within the network. There is also an improvement in the throughput which results in providing better QoS and which further results in increasing the lifetime of the network. For the purpose of evaluating and comparing the performance of both the routing protocols, the computation model is used. Guangjie Han, et.al (2015) proposed in this paper [11], that for various underwater applications, the underwater WSNs (UWSNs) are being used a lot. For the purpose of data transmission and other real-time applications, the energy efficient routing protocol is very important. There are some special characteristics of UWSNs which include dynamic structure, high energy consumption, as well as high latency. These properties have made it difficult to build certain routing protocols for this network. The already existing routing protocols are to be studied in this paper and their
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2380 performances are to be comparedwithrespecttoeachother. The routing protocols are classified into two categories on the basis of the route decision maker they use. The results have shown that there are still many enhancements to be made in this technology. In the future work, new technologies are to be evolved to provide better results. Lein Harn, et.al (2016) proposed in this paper [12], a novel design of secure end-to-end data communication. A newly designed group key pre-distribution method is proposed here which provides a unique groupkeywhichisalsoknown as the path key This key is used for protecting the transmitted data which is present in the complete routing path. There are many pairwise shared keys used in repeated form for the purpose of encryption and decryption in the network. To avoid repetitive use,theuniqueend-to-endpath key is proposed here which protects the data which is transmitted across the network. The sensors can be authenticated using this protocol for the purpose of establishing path as well as the path key. Through this protocol, the time which is needed to process data through intermediate nodes is reduced, which is an important advantage here. JingJing Yan, et.al (2016) proposed in this paper [13], that it is very important to increase the lifetime of a network due to the limited battery available in the sensors. For this purpose the energy-efficient routingtechniquesareverywidelyused. The routing protocols that are already proposed are studied and classified into homogeneous and heterogeneous categories as per their orientations. Also the static and mobile protocols are classified accordingly. The characteristic properties, limitation as well as applications are also discussed. The various issues which are related to the energy-efficiency of the routing protocol designs are enlisted here. The mobile WSNs provide more enhanced results as compared to the static WSNs which result in improvement in terms of energy efficiency, energy balance, and higher coverage. The implementations as well as the deployment costs increase however, in these types of networks. Author Name Year Description Outcomes Sarab F. Al Rubeaai, Mehmmood A. Abd, Brajendra K. Singh, Kemal E. Tepe 2015 In this paper, a novel 3D real-time geographical routing protocol (3DRTGP) for WSNs. The numbers of forwarding nodes within the network are controlled by this protocol. With respect to the end-t-end delay and miss ration parameters, this protocol has shown better performance than theother routing protocols. Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid HaseebandAbdul Waheed Khan,” 2015 A Trust and Energy aware Routing Protocol (TERP) for the purpose of detection and isolation of malicious nodes. The energy consumption amongst the trusted nodes is balanced when the routing data utilizes the shorter paths with the help of this routing strategy. According to the simulation results achieved there is a reduction in the energy consumption, enhancement inthe throughput as well as lifetime of the network when the TERP is used as compared to other protocols. Gurbinder Singh Brar, ShalliRani, Vinay Chopra, Rahul Malhotra, Houbing Song, Syed Hassan Ahmed 2016 A directional transmission based energy aware routing protocol named as PDORP is proposed. The properties of Power Efficient Gathering Sensor Information System (PEGASIS)andDSRrouting protocols are combined in this newly proposed protocol. There is also an improvement in the throughput which results in providing better QoS and which further results in increasing the lifetime of the network. Guangjie Han, Jinfang Jiang, Na Bao, Liangtian Wan, and Mohsen Guizani 2015 For the purpose of data transmission and other real-time applications, the energy efficient routing protocol is very important. There are some special characteristics of UWSNs which include dynamic structure, high energy consumption, as well as high latency. The results have shown that therearestill many enhancements to be made in this technology. In the future work, new technologies are to be evolved to provide better results. Table -1: Routing Protocols of WSN
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2381 Lein Harn, Ching-Fang Hsu, Ou Ruan, and Mao-Yuan Zhang 2016 A novel design of secure end-to- end data communication is proposed. A newly designed group key pre-distribution method is proposed here which provides a unique group key which is also known as the path key. Through this protocol, the time which is needed to process data through intermediate nodes is reduced, which is an important advantage here. JingJing Yan, MengChu Zhou, and ZhiJun Ding 2016 The routing protocols that are already proposed are studied and classified into homogeneous and heterogeneous categories as per their orientations. The mobile WSNsprovidemore enhanced results as compared to the static WSNs which result in improvement in terms of energy efficiency, energy balance, and higher coverage. Table -2: Security Techniques for MANETs Name Year Description Outcomes Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai 2015 A Dynamic Source Routing (DSR)- based routing mechanismisusedinthis paper to resolve these issues. It is known as the Cooperative Bait Detection Scheme (CBDS). This technique inherits the advantages of both proactive and reactive defense architectures and the results achieved show that the outcomes vary according to the presence or absence of malicious nodes in the network. Adnan Nadeem, and Michael P. Howarth 2013 A survey of various attacks is presentin the paper and further the intrusion detection as well as protection mechanisms are reviewed. The results evaluated show the properties of both of these techniques and their applications are defined accordingly. The further research areas are identified at the end. Ming Yu, Mengchu Zhou 2009 An optimal routing algorithm along with the routing metricisalsoproposed in this paper whichcombinesthenode’s trustworthiness and performance properties. The advantages of the proposed attack detection and routing algorithm can be seen in the simulation results derived. The comparisons are made with some already known protocols to show the enhancements made in this work. Sohail Abbas, MadjidMerabti,David Llewellyn-Jones, and Kashif Kifayat 2012 A new lightweight scheme is proposed here, which helps in detecting the new identities of Sybil attackers.Thisistobe done without using the centralized trusted third party or any extra hardware like geographical positioning or directional antenna etc. Many extensive simulations andreal- world testbed experiments are presented and it is concluded this method detects the Sybil identities with good accuracy even when mobility is seen in the network. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Abbas Jamalipour 2007 In this paper, all the possible attacksare discussed in details and their state-of- the-art of security issues are discussed. The routing attacks such as link spoofing and colluding misrelay attacks are studied well. Also, the ways to prevent or remove such attack from the network are proposed in the existing MANET protocols. Yingbin Liang, H. Vincent Poor, and Lei Ying 2011 There are n number of legitimate mobile nodes and m number of malicious nodes in the MANET. Alsothe The active attacks need to satisfy more stringent conditions on the number of malicious nodes than the
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2382 delay constraint D is used for the transmission between the legitimate nodes. passive attacks for achieving same throughput. Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu 2012 In this paper, to handle the various routing attacks in a systematic manner, a risk-aware response mechanism is proposed. This approachisbasedonthe extended Dempster-Shafer mathematical theory of evidences. This method introduces a notion which enlists the important factors required. The experiments achieved show the effectiveness of this proposed approach on the basis of certain performance metrics. 3. CONCLUSIONS In this work, it is been concluded that wireless sensor network is the network in which security and energy consumption is the major issue . In the recent times, various techniques has been proposed to increase lifetime of the network. In this work, energy efficient techniques has been reviewed and discussed in termsofdescriptionandoutcome The techniques which are proposed in the recent times to increase security of Adhoc networks are also discussed REFERENCES [1] G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, andW. Hong, “A macroscope in the redwoods,” 2005, 3rd ACM SenSys, New York, NY, USA, pp. 51–63 [2] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M. Welsh, USENIX Association, “Fidelity and yield in a volcano monitoring sensor network,” 2006, 7th OSDI, Berkeley, CA, USA, pp. 381–396 [3] M. Li and Y. Liu, “Undergroundcoal mine monitoring with wireless sensor networks,” 2009, ACMTrans.Sen.Netw., vol. 5, pp. 10:1–10:29 [4] P. Vicaire, T. He,Q.Cao, T.Yan,G. Zhou, L.Gu, L. Luo, R. Stoleru, J. A. Stankovic, and T. F.Abdelzaher,“Achievinglong- term surveillance in VigilNet,” 2009, ACM Trans. Sen. Netw., vol. 5, pp. 9:1–9:39 [5] N. Xu, S. Rangwala, K. K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, and D. Estrin, “A wireless sensor network for structural monitoring,” 2004, 2nd ACM SenSys, New York, NY, USA, pp. 13–24 [6] L. Liu, X. Zhang, and H. Ma, “Optimal node selection for target localization in wireless camera sensor networks,” 2010, IEEE Trans. Veh Technol., vol.59,no.7,pp.3562–3576 [7] Y. Weng, W. Xiao, and L. Xie, “Sensor selection for parameterized random field estimation in wireless sensor networks,” 2011, J. Control Theory Appl., vol. 9, pp. 44–50 [8] Sarab F. Al Rubeaai, Mehmmood A. Abd, Brajendra K. Singh, Kemal E. Tepe,” 3D Real-Time Routing Protocol with Tunable Parameters for Wireless Sensor Networks”, 2015, IEEE Sensors Journal [9] Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb and Abdul Waheed Khan,” TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network”, 2015, IEEE [10] Gurbinder Singh Brar, Shalli Rani, Vinay Chopra, Rahul Malhotra, Houbing Song, Syed Hassan Ahmed,” Energy Efficient Direction BasedPDORPRoutingProtocol ForWSN”, 2016, IEEE [11] Guangjie Han, Jinfang Jiang, Na Bao, Liangtian Wan, and MohsenGuizani,”Routing ProtocolsforUnderwater Wireless Sensor Networks”, 2015, IEEE [12] Lein Harn, Ching-Fang Hsu, Ou Ruan, and Mao-Yuan Zhang,” Novel Design of Secure End-to-EndRoutingProtocol in Wireless Sensor Networks”, 2016, IEEE SENSORS JOURNAL, Vol. 16, No. 6 [13] JingJing Yan, MengChu Zhou, and ZhiJun Ding,” Recent Advances in Energy-efficient Routing Protocols for Wireless Sensor Networks: A Review”, 2016, IEEE
Download now