A Review: Comparative Analysis Of Routing Protocols In Wireless Sensor Network
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
Wireless Sensor networks are recently rapidly growing research area in wireless communications and distributed network. Wireless Sensor Network consists of a large number of low-cost, low-power, and multifunctional sensor nodes with the capability to sense the various types of physical and environmental condition. The sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Due to these limitations routing is major challenge in wireless sensor network. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and ensure reliable multi-hop communication under these conditions. This paper reviews the various routing protocol and their comparison in wireless sensor network
Authors and Affiliations
Prabhdeep Singh1 , Navdeep Kaur2 and Ravneet Kaur
Anomaly Intrusion Detection System using Random Forests and k-Nearest Neighbor
This paper proposed a new approach to design the anomaly intrusion detection system using not only misuse but also anomaly intrusion detection for both training and detection of normal or attacks respectively. The...
Contrast Enhancement for Emissive Display Using Histogram Equalization and Bilateral Tone Adjustment
Contrast enhancement has an important role in image processing applications. Conventional contrast enhancement techniques often fail to produce satisfactory results for broad variety of low contrast images or canno...
Utility Based Routing in Mobile Networks
Self Adaptive Utility based Routing SAURP is characterized by the ability of identifying potential opportunities of forwarding messages to their destinations through a novel utility function based mechanism in whic...
An Efficient Data Hiding Technique for Steganography
Bose Chaudhuri Hochquenghem (BCH) based data hiding scheme for JPEG steganography is presented. Traditional data hiding approaches hide data into each block, where all the blocks are not overlapping each other. Two conse...
Protected Data Forwarding by Erasure Coding to Cloud Storage System
Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services...