Comparative Study of Routing Techniques in Wireless Sensor Network

  • Authors

    • Mr Dhaigude Tanaji Anandrao
    • Dr Latha Parthiban
    • Mr R. A. Veer
    • Dr L C Siddanna Gowd
    • Prof. Avinash J. Kokare
    https://doi.org/10.14419/ijet.v7i3.34.19703
  • WSN, routing algorithm, WSN energy limitation.
  • A Wireless Sensor Network is made up of small sensor nodes. These nodes are deployed in monitoring area. All nodes collect necessary data and route this data to centre server. A WSN should have self-organizing capability, as nodes positions are not determined in advance. Important factor in WSN is co-operation between nodes. Depending on WSN architecture and application, routing between nodes can vary. This paper presents a comparative study of different routing protocols/algorithm in WSN. Depending on network organization, WSN routing algorithms gets divided into 3 types, i.e. location based, hierarchical and flat. These routing algorithms can be divided further into sub types, depending on how an algorithm/protocol operates. This paper presents advantages and limitations of each routing algorithm.

     

  • References

    1. [1] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-E±cient Communication Protocol for Wireless Mi-crosensor Networks," Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS '00), January 2000.

      [2] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed delusion: a scalable and robust communication paradigm for sensor networks," Proceedings of ACM MobiCom '00, Boston, MA, 2000, pp. 56-67.

      [3] W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive Protocols for Information Dissemination in Wireless Sensor Networks," Proc. 5th ACM/IEEE Mobicom Conference (MobiCom '99), Seattle, WA, August, 1999. pp. 174-85.

      [4] Marco Zennaro, ICTP Trieste-Italy, “Introduction to Wireless Sensor Networksâ€, February 2012

      [5] Madhur Gupta, Monika Bansal, “Security Issues in Wireless Sensor Networksâ€, MIT International Journal of Computer Science & Information Technology Vol. 3, No. 1, Jan. 2013

      [6] G.D. Abowd, J.P.G. Sterbenz, Final report on the interagency workshop on research issues for smart environments, IEEE Personal Communications (October 2000) 36–40.

      [7] S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm forWireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN), Aug.2010, vol. 2, no. 3, pp. 49-61.

      [8] I.F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, Aug. 2002.

      [9] YogeshSankarasubramaniam, zgr B. Akan, and Ian F. Akyildiz. ESRT: event-to-sink reliable transport in wireless sensor networks. In ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2003.

      [10] K. Vijayakumar C. Arun, Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC, Cluster Computing DOI 10.1007/s10586-017-1176-x, Sept 2017.

      [11] K. Vijayakumar and C. Arun, “A Survey on Assessment of Risks in Cloud Migrationâ€, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.66 May 2015.

  • Downloads

  • How to Cite

    Dhaigude Tanaji Anandrao, M., Latha Parthiban, D., R. A. Veer, M., L C Siddanna Gowd, D., & Avinash J. Kokare, P. (2018). Comparative Study of Routing Techniques in Wireless Sensor Network. International Journal of Engineering & Technology, 7(3.34), 940-943. https://doi.org/10.14419/ijet.v7i3.34.19703