A Comprehensive Review of Geographic Routing Protocols in Wireless Sensor Network
Journal Title: Information Dynamics and Applications - Year 2022, Vol 1, Issue 1
Abstract
To analyses the impact of high mobility, dynamic topologies, scalability and routing due to the more dynamic changes in network. To enhance mobile Ad-hoc network (MANET) self-organization capabilities by geographical routing algorithm during mobility. In this paper, a survey has been carried out on geographic routing protocols, such as hybrid routing, Greedy Routing, face-2 Algorithm, Perimeter Routing, quasi random deployment (QRD) techniques and time of arrival (TOA). An optimized multipath routing in wireless sensor network (WSN), energy utilization, detection of anonymous routing, node mobility prediction, data packet distribution strategies in WSN is analyzed. Geographic routing offers previous data packet information such as physical locations, packet elimination dependencies, storage capacity of topology, Associate costs and also identifies the dynamic behavior of nodes with respect to packets frequencies.
Authors and Affiliations
Mamtha M. Pandith, Nataraj Kanathur Ramaswamy, Mallikarjunaswamy Srikantaswamy*, Rekha Kanathur Ramaswamy
Routing Attack Detection Using Ensemble Deep Learning Model for IIoT
Smart cities, ITS, supply chains, and smart industries may all be developed with minimal human interaction thanks to the increasing prevalence of automation enabled by machine-type communication (MTC). Yet, MTC has subst...
An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs
Recent transmission of large volumes of data through mobile ad hoc networks (MANETs) has resulted in degraded Quality of Service (QoS) due to factors such as packet loss, delay, and packet drop in multipath routing. To a...
Enhanced Defect Detection in Insulator Iron Caps Using Improved YOLOv8n
To address the challenges in detecting surface defects on insulator iron caps, particularly due to the complex backgrounds that hinder accurate identification, an improved defect detection algorithm based on YOLOv8n, w...
Optimizing Software Vulnerability Detection with MDSADNet: A Multi-Scale Convolutional Approach Enhanced by Mantis-Inspired Optimization
The persistent emergence of software vulnerabilities necessitates the development of effective detection methodologies. Machine learning (ML) and deep learning (DL) offer promising avenues for automating feature extracti...
K-Means Clustering Algorithm Based on Improved Differential Evolution
The traditional K-means clustering algorithm has unstable clustering results and low efficiency due to the random selection of initial cluster centres. To address the limitations, an improved K-means clustering algorithm...