WSN ROUTING PROTOCOLS: A REVIEW

Abstract

 WSN is a set of connected tiny devices (sensor nodes) with limited energy resource. WSNs have ability to extract the information from the harsh and hostile environment without human interaction. Once, WSN is deployed, it is impossible to recharge or replace the energy resource due to inaccessibility of nodes. So, network lifetime and fault tolerance are critical parameters. It’s become very important to handle energy resource carefully as it plays vital role in prolonging the network lifetime. In this paper WSN Routing Protocols are discussed to enhance the deep understanding of underlying issues in this domain.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 A REVIEW PAPER ON IMPROVED K-MEANS TECHNIQUE FOR OUTLIER DETECTION IN HIGH DIMENSIONAL DATASET

 In many data mining application domain outlier detection is an important task, it can be regard as a binary asymmetric or unbalanced classification of pattern where one class has higher cardinality than the other,...

 A COMPARATIVE STUDY BETWEEN DTS-I ENGINE AND SINGLE SPARK IGNITION ENGINE

 Today’s common trend is that people want strong performance and greater fuel efficiency but single spark ignition engines fail to satisfy these needs now-a-day’s complete combustion is not at all possible in autom...

THE INFLUENCE OF PROCESS PARAMETERS ON MICROHARDNESS AND MECHANICAL PROPERTIES OF FSW ALUMINIUM 5083 ALLOY BUTT JOINT

Recently the air craft and military industries widely have been using aluminium alloys particularly because of their fine strength to weight ratio. However in compare with steels they represent welding difficulties and...

On the Non-Homogeneous Equation of the Eighth Degree with Six Unknowns x5-y5+(x3-y3)xy = p(z2-w2)2T3

We obtain infinitely many non-zero integer sextuples (x, y, z,w, p,T ) satisfying the non-homogeneous equation of degree eight with six unknowns given by x5 - y5 + (x3 - y3)xy = p(z2 - w2)2T3. Various interesting relat...

 Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

 Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmi...

Download PDF file
  • EP ID EP116766
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Ankur Singh Bist (2015).   WSN ROUTING PROTOCOLS: A REVIEW. International Journal of Engineering Sciences & Research Technology, 4(4), 242-248. https://europub.co.uk/articles/-A-116766