Wireless sensor network: Routing protocols and attacks - A survey
Abstract
Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the user. This transmission can be routed from one node to another using numerous routing protocols for wireless sensor network. Though purposive, there are some constraints of the sensor nodes due to computing power, storage capacity and limited power. In this review article, we will discuss wireless sensor network's architecture. Further, we will discuss classification of routing protocols according to some factors and summaries on their mode of operation. Lastly, we put up a comparative study on these protocols. ? 2015 IEEE.
Journal
2015 International Conference on Computing for Sustainable Global Development, INDIACom 2015
Collections
Related items
Showing items related by title, author, creator and subject.
-
A Study on the 3D Hopfield Neural Network Model via Nonlocal Atangana-Baleanu Operators
Rezapour, Shahram; Kumar, Pushpendra; Erturk, Vedat Suat; Etemad, Sina (Hindawi Limited, 2022-07-07)Hopfield neural network (HNN) is considered as an artificial model derived from the brain structures and it is an important model that admits an adequate performance in neurocomputing. In this article, we solve a dynamical ... -
Noise Estimation Using Back Propagation Neural Networks
Singh, D.; Kaur, A. (Institute of Physics, 2022-04-29)In this paper, a new Backpropagation Neural Network-based noise estimation method is proposed to estimate Rician noise from MRI images. To train BNN features of MRI images such as, contrast, homogeneity, dissimilarity, ... -
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Chahal, Prabhjot Singh; Khurana, Surinder Singh (Modern Education and Computer Science Press, 2016)Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN ...