2008 International Conference on Advanced Computer Theory and Engineering 2008
DOI: 10.1109/icacte.2008.146
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Routing Protocols and Challenge of Holes in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Some kind of information about the network topology is usually needed. A great number of proposals have been presented in the context of WSANs (Akkaya and Younis, 2005;Subramanian, 2004;Al-Karaki and Kamal, 2004;Khan and Javed, 2008). In this paper, the main proposals are highlighted emphasizing the ones that deal with QoS issues.…”
Section: Routing Protocolsmentioning
confidence: 98%
“…Some kind of information about the network topology is usually needed. A great number of proposals have been presented in the context of WSANs (Akkaya and Younis, 2005;Subramanian, 2004;Al-Karaki and Kamal, 2004;Khan and Javed, 2008). In this paper, the main proposals are highlighted emphasizing the ones that deal with QoS issues.…”
Section: Routing Protocolsmentioning
confidence: 98%
“…In this routing technique, the nodes are divided into rectangular clusters, the nodes in each rectangle or clusters form chain with Cluster Head (CH) [7]. This CH collects data from all nodes and send it to BS.…”
Section: Energy-balanced Chain Cluster Routing (Ebcrp)mentioning
confidence: 99%
“…As its name suggests, it selects some data aggregators on the basis of some position information criteria [7]. The nodes are divided into geographical clusters.…”
Section: Position-based Aggregator Node Election (Panel)mentioning
confidence: 99%
“…The time of the delivery is important for the routing scheme, especially if the influenced message contains mission-critical routing information. Such an attack has a severe impact on routing protocols since the colluding nodes use a different communication channel to route packets (Khan and Javed, 2008). For instance, a wormhole is created between the BS and a node at the opposite side of the network, thus instead of multiple hops the node appears to be only a single hop from the BS.…”
Section: Analyses Of Common Attacks On Wsnsmentioning
confidence: 99%