SinkTrail Protocol with a Dead End Free Topology Used In WSN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114 | Views: 272

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.4 / 10


     

SinkTrail Protocol with a Dead End Free Topology Used In WSN

Bhushan Zatkar, Nilesh Vani


Abstract: Now a day WSNs are widely used in many reasons such as monitoring of various conditions related to the environment, precious species and monitoring the infrastructure, process control in many automation company etc. As we know that all such WSN are built around sensor nodes. Providing security to this node as well as energy consumption of this node are very challenging. There are lots of flexibility in the movement of mobile sinks to dynamically achieve to various terrestrial changes, without using GPS devices or predefined landmark. SinkTrail creates a logical coordinate system for routing and forwarding data packets, so that it can be used in diverse application scenario. SinkTrail protocol has a major disadvantage of dead end while routing or forwarding data packets. In Our proposed system we reduces the control overhead and find an alternate neighbourhood node if dead end occur in SinkTrail. Here we also find the shortest routing path using dead end free topology.


Keywords: Wireless Sensor Network, SinkTrail Protocol, Dead End Free Topology


Edition: Volume 4 Issue 12, December 2015


Pages: 537 - 540


DOI: https://www.doi.org/10.21275/NOV151819



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Bhushan Zatkar, Nilesh Vani, "SinkTrail Protocol with a Dead End Free Topology Used In WSN", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 537-540, https://www.ijsr.net/getabstract.php?paperid=NOV151819, DOI: https://www.doi.org/10.21275/NOV151819

Similar Articles

Downloads: 161 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top