2020
DOI: 10.33640/2405-609x.1585
|View full text |Cite
|
Sign up to set email alerts
|

Direct Line Routing Protocol to Reduce Delay for Chain Based Technique in Wireless Sensor Network

Abstract: The main objective of routing protocol is to select the next-hop connection node for packets traveling from source to distention. Greedy algorithm depends on the distance only to select the next-hop connection and it is building one chain only. Delay is considering the main drawback in all chain based routing protocols in the wireless sensor network. Direct Line Routing Protocol (DLRP) is a proposed protocol in this scientific research and it has three phases which are intraconnection, interconnection and chai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 21 publications
(21 reference statements)
0
1
0
Order By: Relevance
“…Haydar Abdulameer et al [6] present a backbone construction mechanism for a routing protocol for deterministic node deployment. The wireless sensor network protocol has the concept of multi-chain and multicluster and deterministic routing technique of node deployment, which finds the advantage of chain and cluster approach on small sensor devices and delivers specific data to the base station in a small organization, so this protocol extends the network lifetime and reduces node energy.…”
Section: Related Workmentioning
confidence: 99%
“…Haydar Abdulameer et al [6] present a backbone construction mechanism for a routing protocol for deterministic node deployment. The wireless sensor network protocol has the concept of multi-chain and multicluster and deterministic routing technique of node deployment, which finds the advantage of chain and cluster approach on small sensor devices and delivers specific data to the base station in a small organization, so this protocol extends the network lifetime and reduces node energy.…”
Section: Related Workmentioning
confidence: 99%
“…Keeping an eye on network resources in order to spot unusual activity and abuse is the aim of packet sniffing. This idea has had a sharp increase in acceptance and integration into the infrastructure for overall information security [6], [7]. With the advent of computer security risk, the detection as a concept was created.…”
Section: Introductionmentioning
confidence: 99%