Wireless Sensor networks: Routing protocols, Challenges, Solutions
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 4
Abstract
the most important evolution of the modern era is Wireless Sensors networks. Recent advancements in WSNs also led to the implementation of several new protocols which are to be implemented for proper functioning of the network. This paper reviews the different type of routing techniques used and the different type of routing protocols used also the routing protocols problems .We have also provided the necessary security solutions regarding the routing problems and also the different types of sensors used based on properties.
Authors and Affiliations
Ponukumati Sivaram# , Suresh Angadi
Wireless Sensor networks: Routing protocols, Challenges, Solutions
the most important evolution of the modern era is Wireless Sensors networks. Recent advancements in WSNs also led to the implementation of several new protocols which are to be implemented for proper functioning of...
Speaker Independent Recognition System with Mouse Movements
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...
A Study on Network Security Aspects and Attacking Methods
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better u...
Offensive Decoy Technology For Cloud Data Attacks
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...
Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique
Network security risks grow tremendously in recent past, the attacks on computer networks have enhanced hugely and need economical network intrusion detection mechanisms. Data processing and machine-learning techni...