International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 106

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016


A Survey on By-Passing Techniques in Wireless Sensor Network

Shazia Almas [2] | Arudra.A


Abstract: In wsn there are numerous assaults, for example, equipment disappointment and programming dirtiness among the various hubs in an exceedingly Wireless detector Network. The detected information from alternative clean locales might likewise get stuck in an exceedingly infected space have to be compelled to no earlier possibility courses of action are created. The arrangement is to By-pass the infected hub progressively utilizing distinctive procedures. After by-passing the bundle from the contaminated territory utilizing BPR system, we are finding the new method for supplying the data from source to destination through the best energy efficient neighbor hub.


Keywords: Wireless Sensor Network, Efficient neighbor hub, By-pass system


Edition: Volume 5 Issue 6, June 2016,


Pages: 1094 - 1096

A Survey on By-Passing Techniques in Wireless Sensor Network


How to Cite this Article?

Shazia Almas, Arudra.A, "A Survey on By-Passing Techniques in Wireless Sensor Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV164335, Volume 5 Issue 6, June 2016, 1094 - 1096, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Wireless Sensor Network'

Downloads: 157 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri | S. K. Srivatsa [4]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article


Top