Designing Optimal Path for Wireless Sensor Networks by Combining Energy and Security Components.
Girish. R. Deshpande1, V.S. Rajpurohit2, S.S. Sannakki3, Sudhindra. K. Madi4
1Girish. R. Deshpande, Department of Computer Science, or University, Industry, City, Country.
2V.S. Rajpurohit, Department of Computer Science, or University, Industry, City, Country.
3S.S. Sannakki, Department of Computer Science, or University, Industry, City, Country.
4Sudhindra. K. Madi, Department of Computer Science, or University, Industry, City, Country.
Manuscript received on 03 December 2019 | Revised Manuscript received on 11 December 2019 | Manuscript Published on 31 December 2019 | PP: 103-108 | Volume-9 Issue-2S December 2019 | Retrieval Number: B10681292S19/2019©BEIESP | DOI: 10.35940/ijitee.B1068.1292S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The data transferring using multi-directional in remote sensor systems (WSNs) offers little security against malicious attacks through proper acknowledgement. An enemy can use confidential information to attack events, also deteriorate proper functioning of routing protocols. This situation is also expands to mobile and hostile network conditions. In this novel, I would like to propose trustworthy and operational location based routing instructions which provides security and also helpful to extends this works for large wireless sensor networks. The proposed idea has been clearly provide the mechanism to finds out malicious attacks as well as to provide security. As per the statistics, There are constraints on storage, processing of data, battery resources and variation in frequency ranges deeply effects for implementation, in addition to this data propagation ,improper links between network components, requires extra care while choosing different routing paths.
Keywords: Routing Paths, Routing Schemes, Hostile Conditions.
Scope of the Article: Wireless ad hoc & Sensor Networks