Downloads: 106 | Views: 206
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.7 / 10
A Survey on By-Passing Techniques in Wireless Sensor Network
Shazia Almas, Arudra.A
Abstract: In wsn there are numerous assaults, for example, equipment disappointment and programming dirtiness among the various hubs in an exceedingly Wireless detector Network. The detected information from alternative clean locales might likewise get stuck in an exceedingly infected space have to be compelled to no earlier possibility courses of action are created. The arrangement is to By-pass the infected hub progressively utilizing distinctive procedures. After by-passing the bundle from the contaminated territory utilizing BPR system, we are finding the new method for supplying the data from source to destination through the best energy efficient neighbor hub.
Keywords: Wireless Sensor Network, Efficient neighbor hub, By-pass system
Edition: Volume 5 Issue 6, June 2016
Pages: 1094 - 1096
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 805 - 811Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method
Aruna Reddy H., Shivamurthy G., Rajanna M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey