Detection of Greedy Nodes over

Abstract

 Wireless Sensor Networks (WSNs) are ad nodes to collectively gather physical or environmental conditions at diffe transmit data or information from different sensor nodes to a data repository on a server. The life span of the sensor network is limited to its left-over power. The wireless sensor nodes run through the batteries and deployed in hostile environment their battery is usually un the nodes do not forward the packets or data to other nodes in order to conserve their own resources such as energy, bandwidth and power. These types of nodes that act in a selfish manner to conserve their respective resources are called greedy nodes. This paper describes the various techniques to detect greedy nodes. It also discusses the key features of greedy nodes. The main goal of this paper is to propose a novel algorithm to detect such greedy nodes

Authors and Affiliations

Pritima Chhillar

Keywords

Related Articles

 Performance Evaluation of Reactive Routing Protocols in Manet Networks Using GPRS Based Data Traffic Applications

 As it is well known to all that the network topology is the arrangement of various elements like links and nodes etc .So topology is nothing but the structure of network .If the nodes changes their location over t...

 Two Dimensional Mathematical Model of Contamination Distribution in the Lower Reach of Diyala River

 One of rivers that suffer from the effect of pollutants is Diyala River, due to the untreated effluents from Rustimiyah wastewater treatment plant (WWTP) and from other contaminants sources such as Army Canal Outf...

 A STUDY ON LOSS & COST MINIMIZATION BY USING HIGH VOLTAGE DISTRIBUTION SYSTEM

 This paper presents a converter free system to improve the loss minimization and to reduce the cost of power distribution. The high voltage distribution system is implemented to reduce the loss in the present distr...

 Research on Analysis of Different Image Steganography Techniques

 Steganography means the process of thrashing information by embedding messages within other. Information can be in the form of text, audio, video. There are several approaches for the categorization of Steganogra...

 Detection of Logic Bombs

Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arra...

Download PDF file
  • EP ID EP127885
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Pritima Chhillar (30).  Detection of Greedy Nodes over. International Journal of Engineering Sciences & Research Technology, 2(4), 828-831. https://europub.co.uk/articles/-A-127885