Multi-level Structured Tree based Routing for Energy Efficiency in WSN

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The manuscript should contain an abstract. The abstract should be self-contained and citation-free and should not exceed 200 words. The abstract should state the purpose, approach, results and conclusions of the work.  The author should assume that the reader has some knowledge of the subject but has not read the paper. Thus, the abstract should be intelligible and complete in it-self (no numerical references); it should not cite figures, tables, or sections of the paper. The abstract should be written using third person instead of first person.

  • Keywords


  • References

      [1] I. M. M. El Emary, S. Ramakrishnan, ‘Wireless Sensor Networks: From Theory to Applications’, CRC Press, Computers, 799 pages, 2013

      [2] V. C. Gungor, G.P. Hancke, “Industrial Wireless Sensor Networks: Applications, Protocols, and Standards”, CRC Press, Computers, 406 pages, 2013.

      [3] Allen, Christopher, and Tim Dierks. "The TLS protocol version 1.0." The Internet Society, RFC 2246, 1999.

      [4] Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM, no. 2 pp. 120-126, 1978.

      [5] I. Dubrawsky, “How to Cheat at Securing Your Network”, Syngress, Computers, 432 pages, 2011.

      [6] Kohl, John T., B. Clifford Neuman, and Y. Theodore. "The evolution of the Kerberos authentication service." IEEE Computer Society, 1994

      [7] X. Chen, Z. Dai, W. Li, and H. Shi, “Performance Guaranteed Routing Protocols for Asymmetric Sensor Networks”, IEEE Transactions OnEmerging Topics In Computing, Vol.1, No. 1, June 2013.

      [8] D. Takaishi, H. Nishiyama, N. Kato, R. Miura, “Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks”, IEEE Transactions on Emerging Topics In Computing, Vol.2, No.3,September 2014.

      [9] Md.N. Rahman, M A Matin, “Efficient Algorithm for Prolonging Network Lifetime of Wireless Sensor Networks”, IEEE- TsinghuaScience And Technology, Vol.16, No.6, December 2011.

      [10] J.He, S. Ji, Y. Pan, Y. Li, “Reliable and Energy Efficient Target Coverage for Wireless Sensor Networks”, IEEE- Tsinghua Science AndTechnology, Vol.16, No.5, October 2011.

      [11] F. Li and P. Xiong, “Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things”, IEEE SensorsJournal, Vol. 13, No. 10, October 2013.

      [12] Y. Cho and G. Qu, Y. Wu, “Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks”, IEEE Symposium on Security and Privacy Workshops, DOI 10.1109/SPW.2012.32 134, 2014.

      [13] J.N Long, M. Dong, K. Ota, and A. Liu, “Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks”, IEEE-Access, Vol.2, 2014.

      [14] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocols for Wireless Microsensor Networks", Proceedings of the 33rd Hawaaian International Conference on Systems Science (HICSS), January 2000.

      [15] M.F. Balcan_ A. Blum, A. Gupta, “Approximate Clustering without the Approximation”, Proceedings of the twentieth Annual ACM-SIAMSymposium on Discrete Algorithms, pp. 1068-1077, 2009.

      [16] M. Lehsaini, H. Guyennet, and M. Feham, “CES: Cluster-based Energy-efficient Scheme for Mobile Wireless Sensor Networks”, Springer-IFIPInternational Federation for Information Processing, Vol.264; pp. 13–24, 2008.

      [17] L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, A. A. F. Loureiro, “SecLEACH – A Random Key Distribution Solution for Securing Clustered Sensor Networks”, Proceedings of the Fifth IEEEInternational Symposium on Network Computing and Applications,pp.145-154, 2006.




Article ID: 13515
DOI: 10.14419/ijet.v7i2.32.13515

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.