Research Article | OPEN ACCESS
Diversity in Wireless Sensor Networks
Priya Verma and Gurjot Singh Gaba
Discipline of Electronics and Communication, Lovely Professional University, Phagwara,
Punjab, 144411, India
Research Journal of Applied Sciences, Engineering and Technology 2016 11:1095-1111
Received: October 9, 2015 | Accepted: January 16, 2016 | Published: June 05, 2016
Abstract
Due to the potential applications of Wireless Sensor Network in numerous areas, it has gained lot of importance but its functionality is subjected to lifetime of network, energy efficiency of node/network, security of data, coverage of whole network etc. The main aim of this study is to investigate the various domains of Wireless Sensor Networks. These following domains are routing, MAC layer, clustering, deployment, attacks and cryptography. Study of these techniques is concluded through comparison of different protocols on the performance measuring parameters like power consumption, scalability, quality of service, data aggregation and query based approach. It is found from the simulation that MCFA protocol works better than LEACH, SPIN, SMAC, Rumor Routing etc. in terms of power usage, quality of service, scalability and data aggregation.
Keywords:
Clustering, cryptography, deployment, MAC, routing, Wireless sensor network,
References
-
Alam, S. and D. De, 2014. Analysis of security threats in wireless sensor network. Int. J. Wireless Mob. Network., 6(2): 35-46.
CrossRef -
Bokare, M. and A. Ralegaonkar, 2012. Wireless sensor network: A promising approach for distributed sensing tasks. Excel J. Eng. Technol. Manage. Sci., 1: 1-9.
-
Deif, D.S. and Y. Gadallah, 2014. Classification of wireless sensor networks deployment techniques. IEEE Commun. Surv. Tutorials, 16(2): 834-855.
CrossRef -
Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE T. Inform. Theory, 22(6): 644-654.
CrossRef -
Gilbert, E.P.K., B. Kaliaperumal and E.B. Rajsingh, 2012. Research issues in wireless sensor networks applications: A survey. Int. J. Inform. Electron. Eng., 2(5): 702-706.
-
Jirwan, N., A. Singh and S. Vijay, 2013. Review and analysis of cryptography techniques. Int. J. Sci. Eng. Res., 4(3): 1-6.
-
Kumar, A. and V.K. Katiyar, 2015. Routing approaches for wireless sensor networks. Int. J. Comput. Appl., 109(6): 34-40.
CrossRef -
Kumar, V., S.B. Dhok, R. Tripathi and S. Tiwari, 2014. A review study of hierarchical clustering algorithms for wireless sensor networks. Int. J. Comput. Sci. Issues, 11(3): 92-101.
-
Patil, U.A., S.V. Modi and B.J. Suma, 2013a. Analysis and implementation of IEEE 802.11 MAC protocol for wireless sensor networks. Int. J. Eng. Sci. Innov. Technol., 2(5): 278-284.
-
Patil, U.A., S.V. Modi and B.J. Suma, 2013b. A survey: MAC layer protocol for wireless sensor networks. Int. J. Emerg. Technol. Adv. Eng., 3(9): 203-211.
-
Sasikumar, M. and R. Anitha, 2014. Performance evaluation of heterogeneous-HEED protocol for Wireless Sensor Networks. Int. J. Adv. Res. Comput. Commun. Eng., 3(2): 5555-5558.
-
Seema, R.G., 2013. A survey on deployment methods in wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Software Eng., 3(7): 540-543.
-
Shakti, S., 2013. Encryption using different techniques: A review. Int. J. Multidiscipl. Acad. Res., 2(1):1-9.
-
Sharma, S. and P. Mittal, 2013. Wireless sensor networks: Architecture, protocols. Int. J. Adv. Res. Comput. Sci. Software Eng., 3(1): 303-308.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|