Energy Proficient and Security Protocol for WSN: AODV

1
Devendra Kumar
Devendra Kumar
2
Rajesh Sharma
Rajesh Sharma
1 Sri Satya Sai College Of Engineering , Bhopal, M.P, India

Send Message

To: Author

GJCST Volume 14 Issue E8

Article Fingerprint

ReserarchID

CSTNWSG9W01

Energy Proficient and Security Protocol for WSN: AODV Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract not found

16 Cites in Articles

References

  1. Subramanian Ganesh,Ramachandran Amutha (2013). Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms.
  2. Luigi Coppolino,D' Salvatore,Alessia Antonio,Luigi Garofalo,Romano (2013). Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks.
  3. K Parameswari,M Raseen (2013). Aggregating secure data in wireless sensor networks.
  4. Roshan Zameer,Ahmed,Anusha Anigol,R Biradar (2013). Reactive Security Scheme using Behavioral Aspects of Attacks for Wireless Sensor Networks.
  5. Sudharsan Omprakash,Giridharan Nanthagopal,Santosh Kumar Omprakash (2014). A secured energy efficient clustering and data aggregation protocol for wireless sensor network.
  6. Belkadi Malika,Aoudjit Rachida,Daoui Mehammed,Lalam Mustapha (2014). Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks.
  7. Salman Babaknikmard,Taherizadeh (2010). Using mobile agent in clustering method for energy consumption in wireless sensor network.
  8. Kowsar Ali,Sarmistha Neogy,Pradip Das (2010). Optimal Energy-Based Clustering with GPS-Enabled Sensor Nodes.
  9. Di Tang,Tongtong Li,Jian Ren,Jie Wu (2014). Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks.
  10. Jong-Yong Lee,Kyedong Jung,Hanmin Jung,Daesung Lee (2014). Improving the Energy Efficiency of a Cluster Head Election for Wireless Sensor Networks.
  11. Fan Wu (2008). incentive-compatible opportunistic routing for wireless networks.
  12. Naveen Sharma,Anand Nayyar (2014). A Comprehensive Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks.
  13. S Cui,A Goldsmith,A Bahai (2004). Energy-Efficiency of MIMO and Cooperative MIMO Techniques in Sensor Networks.
  14. S Cui,A Goldsmith (2006). Cross-layer design of energy-constrained networks using cooperative MIMO techniques.
  15. M Dohler,Y Li,B Vucetic,A Aghvami,M Arndt,D Barthel (2006). Performance analysis of distributed space-time block encoded sensor networks.
  16. J Thriveni,K R Venugopal,L M Patnaik an improved leader election algorithm.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Devendra Kumar. 2014. \u201cEnergy Proficient and Security Protocol for WSN: AODV\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E8): .

Download Citation

Issue Cover
GJCST Volume 14 Issue E8
Pg. 61- 68
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

December 30, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8590
Total Downloads: 2364
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Abstract not found

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Energy Proficient and Security Protocol for WSN: AODV

Devendra Kumar
Devendra Kumar Jagan Nath Gupta Institute of Engineering and Technology
Rajesh Sharma
Rajesh Sharma

Research Journals