2015
DOI: 10.1155/2015/495945
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

Abstract: Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…7. Hexagonal crowns approach [14] Another controlled sink mechanism using a biased random walk path is presented in [15]. The sinks and the source nodes know their locations.…”
Section: Mobile Sink With Controlled Pathmentioning
confidence: 99%
“…7. Hexagonal crowns approach [14] Another controlled sink mechanism using a biased random walk path is presented in [15]. The sinks and the source nodes know their locations.…”
Section: Mobile Sink With Controlled Pathmentioning
confidence: 99%
“…In the OPNET environment, simulation of small link conventional routing is done in [7]. Comparison of the performance of single-hop and multihop routing followed by simulation is done in [8,9] for an ordinary ad hoc network. A routing protocol has been analyzed in [10,11], where distance, metric value, etc.…”
Section: Related Workmentioning
confidence: 99%
“…With respect to the discussion made in [ 22 , 23 ] for the design and implementation of self- pruning approach, every node in the network (e.g., node S ) piggybacks the set of its neighbors nodes N ( S ), before forwarding the broadcasted packet. The number of neighbor nodes of a corresponding node is calculated as 1-number of hops.…”
Section: A Dynamic Probabilistic Route Discovery Schemementioning
confidence: 99%