SlideShare a Scribd company logo
1 of 10
Download to read offline
http://www.iaeme.com/IJCET/index.asp 7 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 7, Issue 3, May-June 2016, pp. 07–16, Article ID: IJCET_07_03_002
Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=3
Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
A SURVEY OF ENERGY-EFFICIENT
COMMUNICATION PROTOCOLS IN WSNS
Roshan Singh Sachan and Raghav Yadav
Department of Computer Science and Information Technology,
SSET, SHIATS, Naini, Allahabad (U.P.) India
Ajeet Kumar Rai
Mechanical Engineering Department,
SSET, SHIATS Allahabad (UP) India
ABSTRACT
Wireless sensor networks are harshly restricted by storage capacity,
energy and computing power. Wireless Sensor Networks have acquired a lot
of attention by research community, manufacturer as well as actual users for
monitoring remote trades and how to gather data in different environment.
The wireless sensor nodes are especially battery powered devices having life
can be extended for some times while long lasting and reliable for maintaining
consumption of energy and network lifetime while designs applications and
protocols. So it is essential to design effective and energy efficient protocol in
order to enhance the network lifetime. In this paper we present the study of
different energy efficient communication protocols of Wireless Sensor
Networks (WSNs).Then some of the communication protocols which are
widely used in WSNs to improve network performance are also discussed
advantages and disadvantages of each protocols.
Keywords: Wireless Sensor Networks, Energy Efficient, Communication
Protocols
Cite this Article: Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai.
A Survey of Energy-Efficient Communication Protocols in WSNs,
International Journal of Computer Engineering and Technology, 7(3), 2016,
pp. 07–16.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=3
1. INTRODUCTION
Wireless sensor nodes are low power electronic devices, deployed in remote areas,
where power resources are limited. The demand of wireless sensor networks (WSN)
has extended many real world applications such as environment monitoring, military
applications and monitoring etc. There are some issues in WSN like limited battery
power, security etc. There are different layers in this network like as: network layer,
Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai
http://www.iaeme.com/IJCET/index.asp 8 editor@iaeme.com
data link layer, transport layer, physical layer etc. Many different protocols used for
data transmission in the Wireless sensor networks. The energy-efficient
communication protocols of Wireless Sensor Networks have attracted high attention
in recent years. Many published research work has addressed all kind of issues to
relate them. We can find different research work related to energy-efficient protocols.
They tend to focus on layer wise communication protocols. In this section we will see
some works and we will provide some of conclusions presented in these papers.
Sarika Yadav et al. [1] examined current state of approaches for energy
conservation, with various issues on three activities: data collection, routing and
clustering. They give a review of new applications and review the literature on
various aspects of Wireless Sensor Networks [2]. Tifenn Rault et al. [3] classified the
problems in three categories: internal platform, protocol stack and network services.
The author presents a top down survey of energy efficiency and classification of
energy conservation schemes. It reviewed advance in the development of energy
efficient solutions in WSNs. Daquan Feng et al.[5] outlined the technical schemes of
major projects for energy efficient sensor networks and discuss the research an energy
conservation techniques in WSNs. Co-operative communication, energy efficient
metric, network strategies, MIMO and OFDM technologies and optimizations for
developing energy-efficient WSNs were introduced. S. Gowrishanker et al. [6] have
presented the cause of energy loss in sensor nodes. It discussed the energy wastage
given the e-circuit and compares several MAC protocols that have been designed to
reduce the power consumption. Y. G. Lyer et al. [7] presented requirement for a
transport protocol and proposed STCP. STCP is a scalable and reliable at transport
layer. This protocol allows controlled variable congestion, avoidance and support
many applications in the network. Design, implementation and evaluate the STCP
with different network. Y. Zhou et al. [8] proposed Price-oriented Reliable Transport
(PORT) protocol to facilitate the Base Station (sink). This is energy conservation
protocol it uses two schemes: sink application-based optimization scheme and optimal
routing scheme. According to simulation result PORT is effectiveness. In [9] S. J.
Park et al. considered the problem of data transmission from sink-to-sensor. It
proposed a scalable frame work for downstream data transmission. The author
evaluates the proposed framework through NS2 simulator. C. Gungor et al. [10]
presented Delay Sensitive Transport protocol for WSNs. DST is to timely, reliability
event features from sensor field to sink with reduce energy consumption. Simulation
shows the DST protocol occurs high performance in terms of real-time
communication.
2. ISSUES IN WSN
The major issues that affect the design and performance of a wireless sensor network,
some issues discussed [5] are:
2.1 Hardware and Operating System for WSN Wireless sensor networks are
composed of hundreds of thousands of tiny devices called nodes. A sensor node is
often abbreviated as a node. A Sensor is a device which senses the information and
passes the same on to a mote. Sensors are used to measure the changes to physical
environment like pressure, humidity, sound, vibration and changes to the health of
person like blood pressure, stress and heartbeat. A Mote consists of processor,
memory, battery, A/D converter for connecting to a sensor and a radio transmitter for
forming an ad hoc network. A Mote and Sensor together form a Sensor Node. There
can be different Sensors for different purposes mounted on a Mote. Motes are also
sometimes referred to as Smart Dust. A Sensor Node forms a basic unit of the sensor
A Survey of Energy-Efficient Communication Protocols In WSNs
http://www.iaeme.com/IJCET/index.asp 9 editor@iaeme.com
network. The nodes used in sensor networks are small and have significant energy
constraints. The hardware design issues of sensor nodes are quite different from other
applications.
2.2. Wireless Radio Communication Characteristics - Performance of wireless
sensor networks depends on the quality of wireless communication. But wireless
communication in sensor networks is known for its unpredictable nature.
2.3 Deployment - Deployment means setting up an operational sensor network in a
real world environment. Deployment of sensor network is a labor intensive and
cumbersome activity as we do not have influence over the quality of wireless
communication and also the real world puts strains on sensor nodes by interfering
during communications. Sensor nodes can be deployed either by placing one after
another in a sensor field or by dropping it from a plane.
2.4 Localization - Sensor localization is a fundamental and crucial issue for network
management and operation. In many of the real world scenarios, the sensors are
deployed without knowing their positions in advance and also there is no supporting
infrastructure available to locate and manage them once they are deployed.
2.5 Synchronization - Clock synchronization is an important service in sensor
networks. Time Synchronization in a sensor network aims to provide a common
timescale for local clocks of nodes in the network. A global clock in a sensor system
will help process and analyze the data correctly and predict future system behavior.
Some applications that require global clock synchronization are environment
monitoring, navigation guidance, vehicle tracking etc. A clock synchronization
service for a sensor network has to meet challenges that are substantially different
from those in infrastructure based networks.
2.6 Data Base Centric and Querying - Wireless sensor networks have the potential
to span and monitor a large geographical area producing massive amount of data. So
sensor networks should be able to accept the queries for data and respond with the
results.
2.7 Architecture - According to the authors of lack of overall sensor network
architecture is the main factor for currently limiting the progress in sensor networks.
Architecture can be considered as a set of rules and regulation for implementing some
functionality along with a set of interfaces, functional components, protocols and
physical hardware. Software architecture is needed to bridge the gap between raw
hardware capabilities and a complete system.
2.8 Quality of Service - Quality of service is the level of service provided by the
sensor networks to its users. The authors of define Quality of Service (QoS) for sensor
networks as the optimum number of sensors sending information towards
information-collecting sinks or a base station. Since sensor networks are getting
implemented in more and more number of applications which includes mission
critical applications such as military applications and nuclear plant monitoring
applications; QoS is being given considerable review as the events occurring in these
situations are of utmost importance.
2.9 Security - Security in sensor networks is as much an important factor as
performance and low energy consumption in many applications. Security in a sensor
network is very challenging as WSN is not only being deployed in battlefield
applications but also for surveillance, building monitoring, burglar alarms and in
critical systems such as airports and hospitals. Since sensor networks are still a
developing technology, researchers and developers agree that their efforts should be
Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai
http://www.iaeme.com/IJCET/index.asp 10 editor@iaeme.com
concentrated in developing and integrating security from the initial phases of sensor
applications development; by doing so, they hope to provide a stronger and complete
protection against illegal activities and maintain stability of the systems at the same
time.
3. APPLICATIONS OF WSNS
Sensor networks applications can be classified into two categories: tracking and
monitoring. Tracking applications have tracking objects, animal, human, bird and
vehicles and the other is monitoring include indoor monitoring, outdoor monitoring,
environmental monitoring, power monitoring, health monitoring etc.
Figure 1 Applications of sensor networks
3.1 Environmental monitoring - Habitat monitoring is an important tool for
assessing the threat and conservation status of species and protected areas. This can be
used to get the information about the breeding pattern of birds where human cannot
go because it can disturb them. This can be done at global and regional scales, where
data are available.
3.2 Military surveillance - In the battle field some sensor nodes are doing
surveillance, monitoring and guiding systems of intelligent missiles. The detection of
weapons of mass destruction is also performed.
3.3 Area monitoring - It is a common application of WSNs in which WSN is
deployed over a region where some physical phenomenon has to be monitored i.e.
large number of sensors are deployed over a battlefield to detect enemy instead of
using landmines. When the sensors detect the event being monitored (heat, pressure,
sound, light etc), these events needs to be reported to the base.
3.4 Agriculture - By the help of WSN irrigation automation system is developed
which enables efficient water use and reduces waste. Gravity fed water systems can
be monitored by pressure transmitters to monitor water tank levels and pumps are
controlled by wireless devices and water use can be measured and wirelessly
transmitted back to a central control center for billing.
A Survey of Energy-Efficient Communication Protocols In WSNs
http://www.iaeme.com/IJCET/index.asp 11 editor@iaeme.com
3.5 Greenhouse Monitoring - WSNs are used to control the temperature and
humidity levels inside commercial greenhouses. The threshold value is set if
temperature and humidity drops below specific levels then the greenhouse manager
must be notified via e-mail, text message on a cell phone. Host systems can trigger
misting systems, open vents, turn on fans etc.
3.6 Health monitoring – Health monitoring is the main application of the wireless
sensor networks. The help of this monitoring Wireless Sensor Network can improve
the health care and patient monitoring. There are five prototype designs have been
developed for applications such as infant monitoring, alerting the deaf, blood pressure
monitoring and tracking, and fire-fighter vital sign monitoring.
4. ENERGY-EFFICIENT COMMUNICATION PROTOCOLS
Energy-efficient communication protocols are an important and supporting for WSNs
[2]. This protocol stacks must energy efficient in terms of data transmission,
communication and be able to work efficiently across multiple nodes. We review the
different communication protocols proposed for transport layer, network layer and
link layer.
4.1 Sensor Transmission Control Protocol (STCP) - STCP [7] is a unicast protocol
and this protocol support data exchange between two end points. STCP is a transport
layer protocol that provides reliability and congestion detection and support of
application in the same network. STCP functionalities are executed at the Base
Station (BS) and BS having high processing capability and power communicate with
the nodes in the network. Before the sending data a source node must transmit a single
session initiation data packet to the base station. This packet contains information
about the no. of flows from the node. Before transmitting data packet the node must
wait for an acceptance from the BS. The base station estimates the time of arrival of
each data packet from each source for continuous data flow. In a given period of time,
the BS is not receiving a data packet, the BS determine the present required reliability
is met.
Congestion control is being present in STCP. Direction of reliability is sending to
sink. There are two approaches for data packet recovery: hop-by-hop and end-to-end.
STCP used end-to-end approach for data transmission. STCP have packet recovery. In
STCP energy conservation is better because time reliability is high.
4.2 Price-oriented Reliable Transport Protocol (PORT) – PORT [8] Protocol
provides event reliability with minimum energy consumption. PORT follows end-to-
end communication mechanism in the network. Direction of data delivery is source to
the sink. This protocol provides two types of mechanism that insure this reliability.
The first mechanism provides the base station (sink) to adjust the reporting rate of
each information source. The base station adjusts the reporting rate of every source.
The second mechanism to allow to the BS with end-to-end communication cost
information from the source to the BS. This communication cost is reduced
congestion, when congestion occurs in the network. Communication cost increases
with respect to data packet loss. For the reliability must be maintained, the base
station uses the communication cost information to slow-up reporting rate of the
suitable source and increase the reporting rate of other sources that have lower
communication cost. PORT is not providing the data packet recovery and this
protocol is a energy conservative protocol.
4.3 GARUDA – GARUDA [9] is a downstream reliability communication protocol
which uses hop-by-hop recovery mechanism in sensor networks. GARUDA’s using
Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai
http://www.iaeme.com/IJCET/index.asp 12 editor@iaeme.com
the first data packet delivery method. In this protocol the first data packet delivery
using Wait-for-First-Packet (WFP) pulse. This pulse is short duration pulse send
periodically by the base station (sink). It’s protocol design a loss recovery core
infrastructure and two stages negativeACK based recovery process. This
infrastructure use is constructed using the first data packet delivery method. In this
process the receiver notifies the sender that some packets are missing or send the
negative ACK (NACK) about the lost packet in the sensor networks. It uses NACK
based arrangement and contains no congestion control mechanism (CCM). Solution
of the problem is NACK based schemes for receiving at least one packet of the block
by detecting loss of other packets. In the event of packet losses, this protocol uses an
out-of-order forwarding strategy to overcome problem of under utilization. This
strategy allows subsequent data packet to be forwarded even when a data packet is
lost. For recovery of the data packet losses it usages two stages: the first one is core
recovering phase and second non-core recovering phase. In this protocol, the direction
of the data transmission is sink to sensor, while other transport protocol have data
transmission is sensor to sink.
4.4 Delay Sensitive Transport (DST) – Delay Sensitive Transport [10] is an upgrade
version of event-to-sink reliable transport protocol. DST has two different
components: a reliable event transport mechanism and real time event transport
mechanism. The first one mechanism observed delay constrained event reliability
while the second mechanism uses event to sink delay. The event to sink delay is a
measure of the event transport and event process delay.
This protocol measures buffer overflow at each sensor node and calculate the
average sensor node delay. According to the simulation results occur that DST
protocol acquires reliability and timely event detection with reduce energy
consumption and latency.
4.5 Pump slowly, fetch quickly (PSFQ) – PSFQ [11] is a downstream scalable,
robust and reliable protocol. The purpose of this protocol is to guarantee data packet
transmission and reduce the number of transmission for lost detection and data packet
recovery operation. This protocol requires 100% reliability in downstream direction.
For the data delivery to the sink it uses hop-by-hop transmission. To reduce the cost
of loss recovery it uses NACK based loss detection, notification and transmission in
this protocol. PSFQ consists of three basic primitives: pump operation (data
transmission), seek or fetch operation (local loss recovery) and operation report
(feedback mechanism). Node injects data packets into the network for the help of
pump operation. This operation based on simple scheduling scheme. The seek
operation requests a retransmission of the lost data packet from near nodes in the
network. Finally, the operation report provides a feedback status to the users.
According to this report data packets sends from the farthest target node in the
network.
4.6 Event-to-sink reliable transport (ESRT) – ESRT [12] is a novel recent transport
solution that search to achieve reliable event detection with energy conservation and
solving congestion problems. Its algorithm is run mainly at the sink. Sink calculate
the accuracy factor and reporting frequency at each interval. This factor is a measure
of the data received from the source node to the sink.
ESRT reduced the frequency of the source node then reliability is lower than
desired reliability and increased the frequency of the source node then reliability to
achieve the desire reliability. This protocol mechanism is based on monitoring the
routing buffer of each node. According to simulation results, this protocol is able to
A Survey of Energy-Efficient Communication Protocols In WSNs
http://www.iaeme.com/IJCET/index.asp 13 editor@iaeme.com
attain the reliability level with reduce energy expenditure under different networks
states with topology.
4.7 Congestion detection and avoidance (CODA) – CODA [13] is an energy
efficient congestion control technique. That consists of three components for
congestion detection: open-loop (congestion detection), hop-by-hop back pressure and
closed-loop multi source regulation. CODA attempts to detect congestion by regular
monitoring of the transmission channel. According to the results occur that protocol
can improvement performance and reduce energy usage.
TABLE 1 Comparison of communication protocols in WSNs
4.8 Geographical routing – Geo-routing mainly proposed for Wireless Sensor
Networks [14]. It uses greedy forwarding process. In this process data packet
forwarded between source to destination. This mechanism forwards message by
neighbors which are the closest to the destination. Different novel strategies are
improved the performance of geo-routing. Data packet sending randomly to each node
in a region is called geo-casting. These strategies can be divided into two parts:
distance-based forwarding and reception based forwarding. In distance-based
forwarding, which always try to send the data packets a shortest path with any
constructing communication path previously. Reception based forwarding strategy,
where the state of channel is also incorporate into route decision.
In comparison of both forwarding strategy, reception based forwarding is better
than distance based forwarding strategy in terms of efficiency, delivery rate etc.
Finally new geo-forwarding strategies are satisfying energy and minimization of route
disconnection.
4.9 Anchor location service (ALS) – ALS [15] protocol is a grid based protocol that
provide sink location service and support location based routing between source to
destination. It avoids frequent and costly flooding procedures. ALS are evaluated with
well knows protocols using analytical means and simulation. This protocol allows a
scalable sink location service and minimizes the communication along the path.
Residual Energy-Aware Dynamic (READ) algorithm increase energy efficiency, data
packet delivery rate, maintaining the network and network lifetime.
4.10 Secure routing (Sec-ROUT) – In the presence of malicious nodes, this protocol
is resilient SecROUT [16] protocol may launch selective packet dropping attack on
the routing path. This process employs single-path routing and it is energy-efficient.
Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai
http://www.iaeme.com/IJCET/index.asp 14 editor@iaeme.com
4.11 Secure cell relay (SCR) – SCR [17] is provide the resistant to several kind of
attacks on WSNs, including DoS attacks and security attacks like as spoofing, warm
hole, sink hole, clone attack, hello flooding, misdirection attack, Sybil, selective
forwarding attacks etc. SCR is a cluster-based algorithm, where sensor nodes from a
cluster based in the network. This protocol is not used to cluster head election. The
network is divided into equal-size square cells in this protocol. Whole network each
sensor node aware of its own location
Each sensor and sink shares a common key before deployment. The key used for
initial neighbor search and deployment. All sensor nodes and BS are synchronized.
For data security it uses symmetric encryption. The help of key the BS encrypts its
location information after deployment. In the neighbor node search phase, neighbor
sensor node via a three protocol, which establishes the shared secret keys between
neighbor sensor nodes. SCR is an energy efficient protocol. This protocol utilizes that
in most networks are static and location aware. Its achieve security, high throughput
and energy efficient.
4.12 Traffic-Adaptive Medium Access Protocol (TRAMA) – TRAMA increase the
channel utilization in an efficient manner and this protocol attains energy efficiency
by avoid collision and traffic congestion where there are no data transmission [18].
For data and signal transmission TRAMA assumes single, time slotted channel.
TRAMA supports three types traffic: unicast traffic, multicast-cast traffic and broad
cast traffic. This protocol has three components:
 Neighbor Protocol (NP)
 Schedule Exchange Protocol (SEP)
 Adaptive Election Algorithm (AEA)
4.13 Berkeley media access control (B-MAC) – B-MAC [19] is a reconfigurable
CSMA protocol that attains collision avoidance, low power processing and high
channel utilization. B-MAC protocol reforms system performance by employing an
adaptive preamble sampling process. A set of adaptive bi-direction integrated to
reconfigure the protocol depend on the network load.
This protocol holds the following functionality: clear channel assessment and
packet back off, link layer acknowledgement and LPL. It promotes CCA to complete
if the channel is clear for collision avoidance. CCA is an outlier occurs that the
channel energy is extremely below the noise. An outlier is found, the channel is clear
and the channel is busy during the channel sampling time. Packet back-off is used in
case of busy channel. Back-off time is initially defined and randomly chosen.
4.14 Z-MAC – This protocol is a hybrid MAC protocol while offsetting their
weakness that combines the strength of TDMA and CSMA. Z-MAC [20] gains high
channel utilization and low latency under high contention. Z-MAC protocol reduces
collisions between two hop neighbors at minimum cost. This protocol is patent to
dynamic topology changes and time synchronization failures which ensures in the
networks. Z-MAC protocol uses an efficient and scalable channel scheduling
algorithm for channel reuse and slat assignment.
4.15 CC-MAC – This protocol [21] exploits the spatial correlation of the data at the
MAC layer to regulate and redundant data transmissions. This protocol has two
components: event based MAC (E-MAC) and network based MAC (N-MAC). Event
MAC filters the correlated data packet while network MAC routing packets. This
protocol is implemented to each node and shows significant savings in energy and
packet drop rate etc.
A Survey of Energy-Efficient Communication Protocols In WSNs
http://www.iaeme.com/IJCET/index.asp 15 editor@iaeme.com
4.16 Low Power reservation-based MAC Protocol – The low power reservation
[22] based MAC protocol addresses the issue of energy conservation, this protocol
uses a clustered hierarchical network and a TDMA like frame structure has contention
based slot reservation schedule establishment and slotted data transmission. In this
protocol the cluster head increases the frame size that the number of failure exceeds a
predetermined value. The probability of packet transmission is increased by adapting
the frame structure. By adapting frame size, this protocol shows significant energy
conservation due to fewer collisions.
4.17 Low Power distributed MAC protocol – Low power distributed MAC protocol
[23] is combines two types techniques: Multi-channel spread spectrum and
CSMA/CA techniques. This protocol is divided the band into multiple channels, for a
given frequency band. This protocol used two type radios: a low power wake-up radio
and normal data radio. Low power radio monitors the network and normal radio
monitors when there is data transmit or receive.
5. CONCLUSION
We have presented the main energy efficient communication protocols for wireless
sensor networks in this work. The main characteristics required for this protocols and
factors to be considered. We discussed key issues, applications and energy efficient
communication protocols in wireless sensor networks. We show and compare several
communication protocols. We have reviewed in this article issues on different
categories: internal platform, protocol stack and network deployment issues. We have
compared and summarized different communication protocols.
REFERENCES
[1] Sarika Yadav, Rama Shankar Yadav, A review on energy efficient protocols in
wireless sensor networks, Wireless Networks 2016(22) 235-350.
[2] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network
survey, Computer Networks 52 (2008) 2292–2330.
[3] Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Energy efficiency in
wireless sensor networks: A top-down survey, Computer Networks 67 (2014)
104-122.
[4] Francesco Carrabs, Raffaele Cerulli, Ciriaco D’Ambrosio, Monica Gentili,
Andrea Raiconi “Maximizing lifetime in wireless sensor networks with multiple
sensor families, in: proceedings Computers & Operations Research 60 (2015)
121-137.
[5] Daquan Feng, Chenzi Jiang, Gubong Lim, Leonard J Cimini Jr, A Survey of
Energy-Efficient Wireless Communications, IEEE Communications Surveys
and Tutorials 15 (2013) 167-178.
[6] Gowrishankar, S., Basavaraju, T.G., D.H., Manjaiah and Kumar Sarkar, Subir
Issues in Wireless Sensor Networks, Proceedings of the World Congress on
Engineering 2008 Vol I WCE 2008, July 2–4, London, U.K.
[7] Y.G. Iyer, S. Gandham, S. Venkatesan STCP: a generic transport layer protocol
for wireless sensor networks, in: Proceedings of the 14th IEEE International
Conference on Computer Communications and Networks, San Diego, CA, 2005.
[8] Y. Zhou, M.R. Lyu, PORT: a price-oriented reliable transport protocol for
wireless sensor network”, in: Proceedings of the 16th IEEE International
Symposium on Software Reliability Engineering (ISSRE), Chicago, IL, 2005.
Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai
http://www.iaeme.com/IJCET/index.asp 16 editor@iaeme.com
[9] S.-J. Park, R. Vedantham, R. Sivakumar, I.F. Akyildiz, A scalable approach for
reliable downstream data delivery in wireless sensor networks, in: Proceedings
of the ACM MobiHoc’04, Roppongi, Japan, 2004.
[10] V.C. Gungor, O.B. Akan DST: Delay sensitive transport in wireless sensor
networks”, in: Proceedings of the Seventh IEEE International Symposium on
Computer Networks (ISCN), 2006, pp. 116–122.
[11] C.-Y. Wan, A.T. Campbell, L. Krishnamurthy PSFQ: a reliable transport
protocol for wireless sensor, in: Proceedings of the 1st
ACM International
workshop on Wireless Sensor Networks and Applications, 2002, pp. 1–11.
[12] Y. Sankarasubramaniam, O.B. Akan, I.F. Akyilidiz, ESRT: event-tosink reliable
transport in wireless sensor networks, in: Proceedings of the MobiHoc,
Annapolis, MD, 2003.
[13] C.-Y. Wan, S.B. Eisenman, A.T. Campbell, CODA: Congestion detection and
avoidance in sensor networks, in: Proceedings of the Sensys, 2003.
[14] K. Seada, M. Zuniga, A. Helmy, B. Krishnamachari, Energy efficient
forwarding strategies for geographic routing in lossy wireless sensor networks,
in: proceeding of the Sensys’04, Baltimore, MD, 2004.
[15] R. Zhang, H. Zhao, M.A. Labrador, The anchor location service (ALS) protocol
for large-scale wireless sensor networks, in: Proceedings of the First
International on Integrated Internet Ad hoc and Sensor Networks, Nice, France,
2006.
[16] J. Yin, S. Madria, SecRout: a secure routing protocol for sensor networks, in
proceedings of the 20th
International Conference on Advanced Information
Networking and Applications (AINA’06), Vienna, Austria, 2006.
[17] X. Du, Y. Xiao, H.-H. Chen, Q. Wu, Secure cell relay routing protocol for
sensor networks, Wireless Communications and Mobile Computing 6 (2006)
375–391.
[18] V. Rajendran, K. Obraczka, J.J. Garcia-Luna-Aceves, Energy efficient,
collision-free medium access control for wireless sensor networks, in:
Proceedings of the First International Conference on Embedded Networked
Sensor Systems (Sensys), Los Angeles, CA, 2003.
[19] J. Polastre, J. Hill, D. Culler, Versatile low power media access for wireless
sensor networks, in: Proceedings of the Sensys’04, San Diego, CA, 2004.
[20] H. Dubois-Ferriere, D. Estrin, M. Vetterli, Packet combining in sensor networks,
in: Proceedings of the Sensys’05, San Diego, CA, 2005.
[21] M.C. Vuran, I.F. Akyildiz, Spatial correlation-based collaborative medium
access control in wireless sensor networks, IEEE/ACM Transactions on
Networking 14 (2006) 316–329.
[22] Mishra, A. Nasipuri, An adaptive low power reservation based MAC protocol
for wireless sensor networks, in: Proceedings of the IEEE International
Conference on Performance Computing and Communications, 2004, pp. 316–
329.
[23] C. Guo, L.C. Zhong, J.M. Rabaey, Low power distributed MAC for ad hoc
sensor radio networks, in: Proceedings of the IEEE Globecom, 2001, pp. 2944–
2948.
[24] Vinay T.P and Sandhya P.N. An Incremental Trust-Based Method For
Robust Position Identification in WSNs, International Journal of
Computer Engineering and Technology, 5(6), 2014, pp. 54–64.

More Related Content

What's hot

Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksIAEME Publication
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 

What's hot (17)

Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
40120140503011
4012014050301140120140503011
40120140503011
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
50120140507012
5012014050701250120140507012
50120140507012
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
A044060107
A044060107A044060107
A044060107
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 

Similar to A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN

Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Autonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesAutonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 

Similar to A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN (20)

Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
L010527175
L010527175L010527175
L010527175
 
D010332935
D010332935D010332935
D010332935
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
B0470208027
B0470208027B0470208027
B0470208027
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Autonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesAutonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridges
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 

Recently uploaded (20)

Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 

A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN

  • 1. http://www.iaeme.com/IJCET/index.asp 7 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 3, May-June 2016, pp. 07–16, Article ID: IJCET_07_03_002 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=3 Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNS Roshan Singh Sachan and Raghav Yadav Department of Computer Science and Information Technology, SSET, SHIATS, Naini, Allahabad (U.P.) India Ajeet Kumar Rai Mechanical Engineering Department, SSET, SHIATS Allahabad (UP) India ABSTRACT Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols. Keywords: Wireless Sensor Networks, Energy Efficient, Communication Protocols Cite this Article: Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai. A Survey of Energy-Efficient Communication Protocols in WSNs, International Journal of Computer Engineering and Technology, 7(3), 2016, pp. 07–16. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=3 1. INTRODUCTION Wireless sensor nodes are low power electronic devices, deployed in remote areas, where power resources are limited. The demand of wireless sensor networks (WSN) has extended many real world applications such as environment monitoring, military applications and monitoring etc. There are some issues in WSN like limited battery power, security etc. There are different layers in this network like as: network layer,
  • 2. Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai http://www.iaeme.com/IJCET/index.asp 8 editor@iaeme.com data link layer, transport layer, physical layer etc. Many different protocols used for data transmission in the Wireless sensor networks. The energy-efficient communication protocols of Wireless Sensor Networks have attracted high attention in recent years. Many published research work has addressed all kind of issues to relate them. We can find different research work related to energy-efficient protocols. They tend to focus on layer wise communication protocols. In this section we will see some works and we will provide some of conclusions presented in these papers. Sarika Yadav et al. [1] examined current state of approaches for energy conservation, with various issues on three activities: data collection, routing and clustering. They give a review of new applications and review the literature on various aspects of Wireless Sensor Networks [2]. Tifenn Rault et al. [3] classified the problems in three categories: internal platform, protocol stack and network services. The author presents a top down survey of energy efficiency and classification of energy conservation schemes. It reviewed advance in the development of energy efficient solutions in WSNs. Daquan Feng et al.[5] outlined the technical schemes of major projects for energy efficient sensor networks and discuss the research an energy conservation techniques in WSNs. Co-operative communication, energy efficient metric, network strategies, MIMO and OFDM technologies and optimizations for developing energy-efficient WSNs were introduced. S. Gowrishanker et al. [6] have presented the cause of energy loss in sensor nodes. It discussed the energy wastage given the e-circuit and compares several MAC protocols that have been designed to reduce the power consumption. Y. G. Lyer et al. [7] presented requirement for a transport protocol and proposed STCP. STCP is a scalable and reliable at transport layer. This protocol allows controlled variable congestion, avoidance and support many applications in the network. Design, implementation and evaluate the STCP with different network. Y. Zhou et al. [8] proposed Price-oriented Reliable Transport (PORT) protocol to facilitate the Base Station (sink). This is energy conservation protocol it uses two schemes: sink application-based optimization scheme and optimal routing scheme. According to simulation result PORT is effectiveness. In [9] S. J. Park et al. considered the problem of data transmission from sink-to-sensor. It proposed a scalable frame work for downstream data transmission. The author evaluates the proposed framework through NS2 simulator. C. Gungor et al. [10] presented Delay Sensitive Transport protocol for WSNs. DST is to timely, reliability event features from sensor field to sink with reduce energy consumption. Simulation shows the DST protocol occurs high performance in terms of real-time communication. 2. ISSUES IN WSN The major issues that affect the design and performance of a wireless sensor network, some issues discussed [5] are: 2.1 Hardware and Operating System for WSN Wireless sensor networks are composed of hundreds of thousands of tiny devices called nodes. A sensor node is often abbreviated as a node. A Sensor is a device which senses the information and passes the same on to a mote. Sensors are used to measure the changes to physical environment like pressure, humidity, sound, vibration and changes to the health of person like blood pressure, stress and heartbeat. A Mote consists of processor, memory, battery, A/D converter for connecting to a sensor and a radio transmitter for forming an ad hoc network. A Mote and Sensor together form a Sensor Node. There can be different Sensors for different purposes mounted on a Mote. Motes are also sometimes referred to as Smart Dust. A Sensor Node forms a basic unit of the sensor
  • 3. A Survey of Energy-Efficient Communication Protocols In WSNs http://www.iaeme.com/IJCET/index.asp 9 editor@iaeme.com network. The nodes used in sensor networks are small and have significant energy constraints. The hardware design issues of sensor nodes are quite different from other applications. 2.2. Wireless Radio Communication Characteristics - Performance of wireless sensor networks depends on the quality of wireless communication. But wireless communication in sensor networks is known for its unpredictable nature. 2.3 Deployment - Deployment means setting up an operational sensor network in a real world environment. Deployment of sensor network is a labor intensive and cumbersome activity as we do not have influence over the quality of wireless communication and also the real world puts strains on sensor nodes by interfering during communications. Sensor nodes can be deployed either by placing one after another in a sensor field or by dropping it from a plane. 2.4 Localization - Sensor localization is a fundamental and crucial issue for network management and operation. In many of the real world scenarios, the sensors are deployed without knowing their positions in advance and also there is no supporting infrastructure available to locate and manage them once they are deployed. 2.5 Synchronization - Clock synchronization is an important service in sensor networks. Time Synchronization in a sensor network aims to provide a common timescale for local clocks of nodes in the network. A global clock in a sensor system will help process and analyze the data correctly and predict future system behavior. Some applications that require global clock synchronization are environment monitoring, navigation guidance, vehicle tracking etc. A clock synchronization service for a sensor network has to meet challenges that are substantially different from those in infrastructure based networks. 2.6 Data Base Centric and Querying - Wireless sensor networks have the potential to span and monitor a large geographical area producing massive amount of data. So sensor networks should be able to accept the queries for data and respond with the results. 2.7 Architecture - According to the authors of lack of overall sensor network architecture is the main factor for currently limiting the progress in sensor networks. Architecture can be considered as a set of rules and regulation for implementing some functionality along with a set of interfaces, functional components, protocols and physical hardware. Software architecture is needed to bridge the gap between raw hardware capabilities and a complete system. 2.8 Quality of Service - Quality of service is the level of service provided by the sensor networks to its users. The authors of define Quality of Service (QoS) for sensor networks as the optimum number of sensors sending information towards information-collecting sinks or a base station. Since sensor networks are getting implemented in more and more number of applications which includes mission critical applications such as military applications and nuclear plant monitoring applications; QoS is being given considerable review as the events occurring in these situations are of utmost importance. 2.9 Security - Security in sensor networks is as much an important factor as performance and low energy consumption in many applications. Security in a sensor network is very challenging as WSN is not only being deployed in battlefield applications but also for surveillance, building monitoring, burglar alarms and in critical systems such as airports and hospitals. Since sensor networks are still a developing technology, researchers and developers agree that their efforts should be
  • 4. Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai http://www.iaeme.com/IJCET/index.asp 10 editor@iaeme.com concentrated in developing and integrating security from the initial phases of sensor applications development; by doing so, they hope to provide a stronger and complete protection against illegal activities and maintain stability of the systems at the same time. 3. APPLICATIONS OF WSNS Sensor networks applications can be classified into two categories: tracking and monitoring. Tracking applications have tracking objects, animal, human, bird and vehicles and the other is monitoring include indoor monitoring, outdoor monitoring, environmental monitoring, power monitoring, health monitoring etc. Figure 1 Applications of sensor networks 3.1 Environmental monitoring - Habitat monitoring is an important tool for assessing the threat and conservation status of species and protected areas. This can be used to get the information about the breeding pattern of birds where human cannot go because it can disturb them. This can be done at global and regional scales, where data are available. 3.2 Military surveillance - In the battle field some sensor nodes are doing surveillance, monitoring and guiding systems of intelligent missiles. The detection of weapons of mass destruction is also performed. 3.3 Area monitoring - It is a common application of WSNs in which WSN is deployed over a region where some physical phenomenon has to be monitored i.e. large number of sensors are deployed over a battlefield to detect enemy instead of using landmines. When the sensors detect the event being monitored (heat, pressure, sound, light etc), these events needs to be reported to the base. 3.4 Agriculture - By the help of WSN irrigation automation system is developed which enables efficient water use and reduces waste. Gravity fed water systems can be monitored by pressure transmitters to monitor water tank levels and pumps are controlled by wireless devices and water use can be measured and wirelessly transmitted back to a central control center for billing.
  • 5. A Survey of Energy-Efficient Communication Protocols In WSNs http://www.iaeme.com/IJCET/index.asp 11 editor@iaeme.com 3.5 Greenhouse Monitoring - WSNs are used to control the temperature and humidity levels inside commercial greenhouses. The threshold value is set if temperature and humidity drops below specific levels then the greenhouse manager must be notified via e-mail, text message on a cell phone. Host systems can trigger misting systems, open vents, turn on fans etc. 3.6 Health monitoring – Health monitoring is the main application of the wireless sensor networks. The help of this monitoring Wireless Sensor Network can improve the health care and patient monitoring. There are five prototype designs have been developed for applications such as infant monitoring, alerting the deaf, blood pressure monitoring and tracking, and fire-fighter vital sign monitoring. 4. ENERGY-EFFICIENT COMMUNICATION PROTOCOLS Energy-efficient communication protocols are an important and supporting for WSNs [2]. This protocol stacks must energy efficient in terms of data transmission, communication and be able to work efficiently across multiple nodes. We review the different communication protocols proposed for transport layer, network layer and link layer. 4.1 Sensor Transmission Control Protocol (STCP) - STCP [7] is a unicast protocol and this protocol support data exchange between two end points. STCP is a transport layer protocol that provides reliability and congestion detection and support of application in the same network. STCP functionalities are executed at the Base Station (BS) and BS having high processing capability and power communicate with the nodes in the network. Before the sending data a source node must transmit a single session initiation data packet to the base station. This packet contains information about the no. of flows from the node. Before transmitting data packet the node must wait for an acceptance from the BS. The base station estimates the time of arrival of each data packet from each source for continuous data flow. In a given period of time, the BS is not receiving a data packet, the BS determine the present required reliability is met. Congestion control is being present in STCP. Direction of reliability is sending to sink. There are two approaches for data packet recovery: hop-by-hop and end-to-end. STCP used end-to-end approach for data transmission. STCP have packet recovery. In STCP energy conservation is better because time reliability is high. 4.2 Price-oriented Reliable Transport Protocol (PORT) – PORT [8] Protocol provides event reliability with minimum energy consumption. PORT follows end-to- end communication mechanism in the network. Direction of data delivery is source to the sink. This protocol provides two types of mechanism that insure this reliability. The first mechanism provides the base station (sink) to adjust the reporting rate of each information source. The base station adjusts the reporting rate of every source. The second mechanism to allow to the BS with end-to-end communication cost information from the source to the BS. This communication cost is reduced congestion, when congestion occurs in the network. Communication cost increases with respect to data packet loss. For the reliability must be maintained, the base station uses the communication cost information to slow-up reporting rate of the suitable source and increase the reporting rate of other sources that have lower communication cost. PORT is not providing the data packet recovery and this protocol is a energy conservative protocol. 4.3 GARUDA – GARUDA [9] is a downstream reliability communication protocol which uses hop-by-hop recovery mechanism in sensor networks. GARUDA’s using
  • 6. Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai http://www.iaeme.com/IJCET/index.asp 12 editor@iaeme.com the first data packet delivery method. In this protocol the first data packet delivery using Wait-for-First-Packet (WFP) pulse. This pulse is short duration pulse send periodically by the base station (sink). It’s protocol design a loss recovery core infrastructure and two stages negativeACK based recovery process. This infrastructure use is constructed using the first data packet delivery method. In this process the receiver notifies the sender that some packets are missing or send the negative ACK (NACK) about the lost packet in the sensor networks. It uses NACK based arrangement and contains no congestion control mechanism (CCM). Solution of the problem is NACK based schemes for receiving at least one packet of the block by detecting loss of other packets. In the event of packet losses, this protocol uses an out-of-order forwarding strategy to overcome problem of under utilization. This strategy allows subsequent data packet to be forwarded even when a data packet is lost. For recovery of the data packet losses it usages two stages: the first one is core recovering phase and second non-core recovering phase. In this protocol, the direction of the data transmission is sink to sensor, while other transport protocol have data transmission is sensor to sink. 4.4 Delay Sensitive Transport (DST) – Delay Sensitive Transport [10] is an upgrade version of event-to-sink reliable transport protocol. DST has two different components: a reliable event transport mechanism and real time event transport mechanism. The first one mechanism observed delay constrained event reliability while the second mechanism uses event to sink delay. The event to sink delay is a measure of the event transport and event process delay. This protocol measures buffer overflow at each sensor node and calculate the average sensor node delay. According to the simulation results occur that DST protocol acquires reliability and timely event detection with reduce energy consumption and latency. 4.5 Pump slowly, fetch quickly (PSFQ) – PSFQ [11] is a downstream scalable, robust and reliable protocol. The purpose of this protocol is to guarantee data packet transmission and reduce the number of transmission for lost detection and data packet recovery operation. This protocol requires 100% reliability in downstream direction. For the data delivery to the sink it uses hop-by-hop transmission. To reduce the cost of loss recovery it uses NACK based loss detection, notification and transmission in this protocol. PSFQ consists of three basic primitives: pump operation (data transmission), seek or fetch operation (local loss recovery) and operation report (feedback mechanism). Node injects data packets into the network for the help of pump operation. This operation based on simple scheduling scheme. The seek operation requests a retransmission of the lost data packet from near nodes in the network. Finally, the operation report provides a feedback status to the users. According to this report data packets sends from the farthest target node in the network. 4.6 Event-to-sink reliable transport (ESRT) – ESRT [12] is a novel recent transport solution that search to achieve reliable event detection with energy conservation and solving congestion problems. Its algorithm is run mainly at the sink. Sink calculate the accuracy factor and reporting frequency at each interval. This factor is a measure of the data received from the source node to the sink. ESRT reduced the frequency of the source node then reliability is lower than desired reliability and increased the frequency of the source node then reliability to achieve the desire reliability. This protocol mechanism is based on monitoring the routing buffer of each node. According to simulation results, this protocol is able to
  • 7. A Survey of Energy-Efficient Communication Protocols In WSNs http://www.iaeme.com/IJCET/index.asp 13 editor@iaeme.com attain the reliability level with reduce energy expenditure under different networks states with topology. 4.7 Congestion detection and avoidance (CODA) – CODA [13] is an energy efficient congestion control technique. That consists of three components for congestion detection: open-loop (congestion detection), hop-by-hop back pressure and closed-loop multi source regulation. CODA attempts to detect congestion by regular monitoring of the transmission channel. According to the results occur that protocol can improvement performance and reduce energy usage. TABLE 1 Comparison of communication protocols in WSNs 4.8 Geographical routing – Geo-routing mainly proposed for Wireless Sensor Networks [14]. It uses greedy forwarding process. In this process data packet forwarded between source to destination. This mechanism forwards message by neighbors which are the closest to the destination. Different novel strategies are improved the performance of geo-routing. Data packet sending randomly to each node in a region is called geo-casting. These strategies can be divided into two parts: distance-based forwarding and reception based forwarding. In distance-based forwarding, which always try to send the data packets a shortest path with any constructing communication path previously. Reception based forwarding strategy, where the state of channel is also incorporate into route decision. In comparison of both forwarding strategy, reception based forwarding is better than distance based forwarding strategy in terms of efficiency, delivery rate etc. Finally new geo-forwarding strategies are satisfying energy and minimization of route disconnection. 4.9 Anchor location service (ALS) – ALS [15] protocol is a grid based protocol that provide sink location service and support location based routing between source to destination. It avoids frequent and costly flooding procedures. ALS are evaluated with well knows protocols using analytical means and simulation. This protocol allows a scalable sink location service and minimizes the communication along the path. Residual Energy-Aware Dynamic (READ) algorithm increase energy efficiency, data packet delivery rate, maintaining the network and network lifetime. 4.10 Secure routing (Sec-ROUT) – In the presence of malicious nodes, this protocol is resilient SecROUT [16] protocol may launch selective packet dropping attack on the routing path. This process employs single-path routing and it is energy-efficient.
  • 8. Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai http://www.iaeme.com/IJCET/index.asp 14 editor@iaeme.com 4.11 Secure cell relay (SCR) – SCR [17] is provide the resistant to several kind of attacks on WSNs, including DoS attacks and security attacks like as spoofing, warm hole, sink hole, clone attack, hello flooding, misdirection attack, Sybil, selective forwarding attacks etc. SCR is a cluster-based algorithm, where sensor nodes from a cluster based in the network. This protocol is not used to cluster head election. The network is divided into equal-size square cells in this protocol. Whole network each sensor node aware of its own location Each sensor and sink shares a common key before deployment. The key used for initial neighbor search and deployment. All sensor nodes and BS are synchronized. For data security it uses symmetric encryption. The help of key the BS encrypts its location information after deployment. In the neighbor node search phase, neighbor sensor node via a three protocol, which establishes the shared secret keys between neighbor sensor nodes. SCR is an energy efficient protocol. This protocol utilizes that in most networks are static and location aware. Its achieve security, high throughput and energy efficient. 4.12 Traffic-Adaptive Medium Access Protocol (TRAMA) – TRAMA increase the channel utilization in an efficient manner and this protocol attains energy efficiency by avoid collision and traffic congestion where there are no data transmission [18]. For data and signal transmission TRAMA assumes single, time slotted channel. TRAMA supports three types traffic: unicast traffic, multicast-cast traffic and broad cast traffic. This protocol has three components:  Neighbor Protocol (NP)  Schedule Exchange Protocol (SEP)  Adaptive Election Algorithm (AEA) 4.13 Berkeley media access control (B-MAC) – B-MAC [19] is a reconfigurable CSMA protocol that attains collision avoidance, low power processing and high channel utilization. B-MAC protocol reforms system performance by employing an adaptive preamble sampling process. A set of adaptive bi-direction integrated to reconfigure the protocol depend on the network load. This protocol holds the following functionality: clear channel assessment and packet back off, link layer acknowledgement and LPL. It promotes CCA to complete if the channel is clear for collision avoidance. CCA is an outlier occurs that the channel energy is extremely below the noise. An outlier is found, the channel is clear and the channel is busy during the channel sampling time. Packet back-off is used in case of busy channel. Back-off time is initially defined and randomly chosen. 4.14 Z-MAC – This protocol is a hybrid MAC protocol while offsetting their weakness that combines the strength of TDMA and CSMA. Z-MAC [20] gains high channel utilization and low latency under high contention. Z-MAC protocol reduces collisions between two hop neighbors at minimum cost. This protocol is patent to dynamic topology changes and time synchronization failures which ensures in the networks. Z-MAC protocol uses an efficient and scalable channel scheduling algorithm for channel reuse and slat assignment. 4.15 CC-MAC – This protocol [21] exploits the spatial correlation of the data at the MAC layer to regulate and redundant data transmissions. This protocol has two components: event based MAC (E-MAC) and network based MAC (N-MAC). Event MAC filters the correlated data packet while network MAC routing packets. This protocol is implemented to each node and shows significant savings in energy and packet drop rate etc.
  • 9. A Survey of Energy-Efficient Communication Protocols In WSNs http://www.iaeme.com/IJCET/index.asp 15 editor@iaeme.com 4.16 Low Power reservation-based MAC Protocol – The low power reservation [22] based MAC protocol addresses the issue of energy conservation, this protocol uses a clustered hierarchical network and a TDMA like frame structure has contention based slot reservation schedule establishment and slotted data transmission. In this protocol the cluster head increases the frame size that the number of failure exceeds a predetermined value. The probability of packet transmission is increased by adapting the frame structure. By adapting frame size, this protocol shows significant energy conservation due to fewer collisions. 4.17 Low Power distributed MAC protocol – Low power distributed MAC protocol [23] is combines two types techniques: Multi-channel spread spectrum and CSMA/CA techniques. This protocol is divided the band into multiple channels, for a given frequency band. This protocol used two type radios: a low power wake-up radio and normal data radio. Low power radio monitors the network and normal radio monitors when there is data transmit or receive. 5. CONCLUSION We have presented the main energy efficient communication protocols for wireless sensor networks in this work. The main characteristics required for this protocols and factors to be considered. We discussed key issues, applications and energy efficient communication protocols in wireless sensor networks. We show and compare several communication protocols. We have reviewed in this article issues on different categories: internal platform, protocol stack and network deployment issues. We have compared and summarized different communication protocols. REFERENCES [1] Sarika Yadav, Rama Shankar Yadav, A review on energy efficient protocols in wireless sensor networks, Wireless Networks 2016(22) 235-350. [2] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey, Computer Networks 52 (2008) 2292–2330. [3] Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Energy efficiency in wireless sensor networks: A top-down survey, Computer Networks 67 (2014) 104-122. [4] Francesco Carrabs, Raffaele Cerulli, Ciriaco D’Ambrosio, Monica Gentili, Andrea Raiconi “Maximizing lifetime in wireless sensor networks with multiple sensor families, in: proceedings Computers & Operations Research 60 (2015) 121-137. [5] Daquan Feng, Chenzi Jiang, Gubong Lim, Leonard J Cimini Jr, A Survey of Energy-Efficient Wireless Communications, IEEE Communications Surveys and Tutorials 15 (2013) 167-178. [6] Gowrishankar, S., Basavaraju, T.G., D.H., Manjaiah and Kumar Sarkar, Subir Issues in Wireless Sensor Networks, Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2–4, London, U.K. [7] Y.G. Iyer, S. Gandham, S. Venkatesan STCP: a generic transport layer protocol for wireless sensor networks, in: Proceedings of the 14th IEEE International Conference on Computer Communications and Networks, San Diego, CA, 2005. [8] Y. Zhou, M.R. Lyu, PORT: a price-oriented reliable transport protocol for wireless sensor network”, in: Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering (ISSRE), Chicago, IL, 2005.
  • 10. Roshan Singh Sachan, Raghav Yadav and Ajeet Kumar Rai http://www.iaeme.com/IJCET/index.asp 16 editor@iaeme.com [9] S.-J. Park, R. Vedantham, R. Sivakumar, I.F. Akyildiz, A scalable approach for reliable downstream data delivery in wireless sensor networks, in: Proceedings of the ACM MobiHoc’04, Roppongi, Japan, 2004. [10] V.C. Gungor, O.B. Akan DST: Delay sensitive transport in wireless sensor networks”, in: Proceedings of the Seventh IEEE International Symposium on Computer Networks (ISCN), 2006, pp. 116–122. [11] C.-Y. Wan, A.T. Campbell, L. Krishnamurthy PSFQ: a reliable transport protocol for wireless sensor, in: Proceedings of the 1st ACM International workshop on Wireless Sensor Networks and Applications, 2002, pp. 1–11. [12] Y. Sankarasubramaniam, O.B. Akan, I.F. Akyilidiz, ESRT: event-tosink reliable transport in wireless sensor networks, in: Proceedings of the MobiHoc, Annapolis, MD, 2003. [13] C.-Y. Wan, S.B. Eisenman, A.T. Campbell, CODA: Congestion detection and avoidance in sensor networks, in: Proceedings of the Sensys, 2003. [14] K. Seada, M. Zuniga, A. Helmy, B. Krishnamachari, Energy efficient forwarding strategies for geographic routing in lossy wireless sensor networks, in: proceeding of the Sensys’04, Baltimore, MD, 2004. [15] R. Zhang, H. Zhao, M.A. Labrador, The anchor location service (ALS) protocol for large-scale wireless sensor networks, in: Proceedings of the First International on Integrated Internet Ad hoc and Sensor Networks, Nice, France, 2006. [16] J. Yin, S. Madria, SecRout: a secure routing protocol for sensor networks, in proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA’06), Vienna, Austria, 2006. [17] X. Du, Y. Xiao, H.-H. Chen, Q. Wu, Secure cell relay routing protocol for sensor networks, Wireless Communications and Mobile Computing 6 (2006) 375–391. [18] V. Rajendran, K. Obraczka, J.J. Garcia-Luna-Aceves, Energy efficient, collision-free medium access control for wireless sensor networks, in: Proceedings of the First International Conference on Embedded Networked Sensor Systems (Sensys), Los Angeles, CA, 2003. [19] J. Polastre, J. Hill, D. Culler, Versatile low power media access for wireless sensor networks, in: Proceedings of the Sensys’04, San Diego, CA, 2004. [20] H. Dubois-Ferriere, D. Estrin, M. Vetterli, Packet combining in sensor networks, in: Proceedings of the Sensys’05, San Diego, CA, 2005. [21] M.C. Vuran, I.F. Akyildiz, Spatial correlation-based collaborative medium access control in wireless sensor networks, IEEE/ACM Transactions on Networking 14 (2006) 316–329. [22] Mishra, A. Nasipuri, An adaptive low power reservation based MAC protocol for wireless sensor networks, in: Proceedings of the IEEE International Conference on Performance Computing and Communications, 2004, pp. 316– 329. [23] C. Guo, L.C. Zhong, J.M. Rabaey, Low power distributed MAC for ad hoc sensor radio networks, in: Proceedings of the IEEE Globecom, 2001, pp. 2944– 2948. [24] Vinay T.P and Sandhya P.N. An Incremental Trust-Based Method For Robust Position Identification in WSNs, International Journal of Computer Engineering and Technology, 5(6), 2014, pp. 54–64.