Energy Efficiency and Traffic Pattern Discovery for Wireless Sensor Networks



Wireless Sensor Networks (WSNs) are regularly framed by the joint effort of the expansive measure of insignificant sensor nodes, which are associated through a wireless medium. In wireless sensor organize, security is a fundamental position in well-lit of its utilization in applications like monitoring, tracking, controlling, surveillance etc. Secure correspondence is greatly critical in conveying key data precisely and on the time through asset imperative sensor nodes. In this paper, our commitment is triple. Firstly, we have outlined the system layer routing assaults on WSNs. Also, we have given a scientific categorization of secure routing protocols of WSNs. Thirdly, we have given a subjective correlation of existing secure routing protocols. This situation is practically equivalent to conveying US Mail through USPS: express sends cost more than customary sends; be that as it may, sends can be conveyed quicker. The convention additionally gives a secure message conveyance alternative to amplify the message conveyance proportion under antagonistic assaults. What's more, we likewise give quantitative secure investigation on the proposed routing convention in light of the criteria proposed. In this way, unauthenticated individual can't get to the first information. By along these lines, the convention gives a secure message conveyance alternative to augment the message conveyance proportion under ill-disposed assaults.


RCS; Sensor; Energy; Routing; Wireless Sensor Network;


. J QiangFeng; D.Manivannan. Routing protocols for sensor netwok, Consumer communications and Network Conference, CCNC, 2004, 435-987.

. K M. Chu; H. Haussecker, F. Zhao. The International Journal of High Performance Computing Applications, 2002, 16(3).

. C B. Karp; H.T. Kung. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, Proc. 6th Ann. Int’l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, New York, 2000, 243-254.

SayyedHussain; TakaleSurendra; MazharFarooqui. Journal of Chemical and Pharmaceutical Research ,2012,4(9), 4406-4411.

. Wood, J. A. Stankovic. IEEE Computer, 35(10):54-62, October 2002

. F. Ducatelle, G. Di Caro, L.M. Gambardella, Ant agents for hybrid multipath routing in mobile ad hoc networks, Proceedings of The Second Annual Conference on Wireless On demand Network Systems and Services (WONSS), January 2005.

. Long Chengzhi;LuoJianping; Xiang Mantian; Yu Guicai. JCIT, 2012,7(18),425 ~ 433.

. Xiuju Liu. JDCTA, 2011,5(8), 340 ~ 347. [9]Liu Lianxin; Liu Yu; ShiGuangxia. Journal of Chemical and Pharmaceutical Research, 2014,6(2), 83-88.

. B. Akan, Y. Sankarasubramaniam and I. F. Akyildiz, “ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks,” Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, Maryland, USA, 2003, pp. 177- 188.

. Di Tang, Tongtong Li, JianRen, Senior Member, IEEE, and Jie Wu, Fellow, IEEE: Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor NetworksIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 4, APRIL 2015

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2020, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at