Providing Efficient Energy to By-Pass Infected Areas in WSNs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 104 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Providing Efficient Energy to By-Pass Infected Areas in WSNs

Shazia Almas, Arudra A

Wireless Sensor Network have been the front line innovation in different remote occasion observing applications, particularly in unsafe zones, threatening situations, battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Although several existing methods BOUNDHOLE, GAR, TWIN ROLLING BALL algorithms are used to avoid these problems but their performance are bounded by their limitations. While transmitting the packet the void problem can also occur that makes the packet unreachable towards the destination. This becomes challenge to avoid routing problem in Greedy routing protocol. Especially the active attacks would decrease the Qos parameters of the System, this paper mainly focuses on the After by-passing the packet from the infected area using BPR technique, the Enhancement added further to this is - We are finding the new path from SOURCE to DESTINATION through the best energy-efficient neighbor node. For that, we are setting the energy model using ene.awk and calculating the energy-efficient of best neighbor node. We have to sort the energy file to get the highest energy neighbor node. In final.awkitwill find the new path from source to destination through best energy efficient neighbor node.

Keywords: Wireless Sensor Network, threatening, smart homes, packet, Greedy routing protocol and energy-efficient

Edition: Volume 5 Issue 5, May 2016

Pages: 1823 - 1828

Share this Article

How to Cite this Article?

Shazia Almas, Arudra A, "Providing Efficient Energy to By-Pass Infected Areas in WSNs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163841, Volume 5 Issue 5, May 2016, 1823 - 1828

Enter Your Registered Email Address





Similar Articles with Keyword 'Wireless Sensor Network'

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 9 | Weekly Hits: ⮙8 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1169 - 1173

Implementation of Long Range Wireless IoT Device for Agriculture Using Multi-Hop Topology Design

Anchla Rajput, Anshul Sarawagi

Share this Article

Downloads: 41 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 66 | Weekly Hits: ⮙11 | Monthly Hits: ⮙44

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Similar Articles with Keyword 'threatening'

Downloads: 60 | Weekly Hits: ⮙3 | Monthly Hits: ⮙19

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1823 - 1828

Providing Efficient Energy to By-Pass Infected Areas in WSNs

Shazia Almas, Arudra A

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1671 - 1674

Multi Model Approach for Money Laundering Identification Using Fund Transition Matrix

G. Krishnapriya, Dr. M. Prabakaran

Share this Article

Downloads: 122 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 984 - 987

Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images

Varsha Waghmare, Syed Akhter

Share this Article

Downloads: 135 | Weekly Hits: ⮙5 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, Nigeria, Volume 3 Issue 8, August 2014

Pages: 314 - 317

Using Fuzzy Classifier for Cholera Analysis

Okpor. M. D

Share this Article

Similar Articles with Keyword 'smart homes'

Downloads: 104 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1823 - 1828

Providing Efficient Energy to By-Pass Infected Areas in WSNs

Shazia Almas, Arudra A

Share this Article

Downloads: 114 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1000 - 1004

Review on Detection of Clone Attacks inWireless Sensor Networks

Nikita R. Kitey, Dr. M. S. Ali

Share this Article

Downloads: 130 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1624 - 1628

An Adaptive e-Health Solution System for Disaster Management

N. J. Kulkarni, Dr. J. W. Bakal

Share this Article

Downloads: 136 | Weekly Hits: ⮙6 | Monthly Hits: ⮙19

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2479 - 2483

The Aware Home: Data Analytics for Smart Homes

Sachin Kumar, Sahana.V

Share this Article

Similar Articles with Keyword 'packet'

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 97 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article



Top