2017
DOI: 10.24001/eec.2.2.3
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Data-Centric based Routing Protocols for Wireless Sensor Networks

Abstract: Abstract-

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Moreover, the query routing protocol can be explicitly classified into rumor routing, directed diffusion routing, disjoint multipath routing, and braided multipath routing [8][9][10][11]. Directed diffusion routing exhibits excellent energy efficiency compared with other query routing methods [12] and can effectively lessen network data stream by query-driven data transmission and local data aggregation [13]. For example, Intanagonwiwat et al explored the use of directed diffusion for a simple remote-surveillance sensor network and enabled diffusion to achieve energy savings by selecting empirically good paths and by caching and processing data in-network [14].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the query routing protocol can be explicitly classified into rumor routing, directed diffusion routing, disjoint multipath routing, and braided multipath routing [8][9][10][11]. Directed diffusion routing exhibits excellent energy efficiency compared with other query routing methods [12] and can effectively lessen network data stream by query-driven data transmission and local data aggregation [13]. For example, Intanagonwiwat et al explored the use of directed diffusion for a simple remote-surveillance sensor network and enabled diffusion to achieve energy savings by selecting empirically good paths and by caching and processing data in-network [14].…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, it restricts legal clients in system from getting entry to services or sources to which they are eligible DoS strike is meant to the scamper"s try to damage or destroy a system, and furthermore for all activities that decrease a network"s capability to set up a service [15]. Here we point out the common types of attacks in wireless sensor networks [22].…”
Section: Security Problems In Wireless Sensor Networkmentioning
confidence: 99%
“…Smart sensors are not expensive and communicate with each other through wireless links positioned in large numbers in different locations to monitor and control different domains. Sensor nodes are little in size, less storage, less expensive in cost with limited source of energy and constrained in ability of processing [22].…”
Section: Description Of Wireless Sensor Network (Wsns)mentioning
confidence: 99%