Abstract
WSNs have been the focus of intensive studies and have seen explosive development in recent years. They have been used in a variety of critical applications, including tracking, decision-making, and time-critical processes, and are capable of integrating sensitive data. For better performance, WSNs employ collaborative steps such as data collection, compilation, analysis, and management of sensing operations. Low-power nodes will have to go through several hops to connect with the sink node. This necessitates the use of neighbors’ nodes as relays. Packets relayed via malicious users, on the other hand, will impede communication and thereby deplete Wireless Sensor Network resources. This paper discusses the architecture, security services, design issues, security challenges, attacks, and routing protocols of wireless sensor networks. This paper also proposes protocols which is more efficient and designed to overcome the issues in the existing routing protocols and the performance is evaluated based on parameters like energy consumption, throughput, delay, packet delivery ratio, packet loss and reliability.
Keyword
Wireless Sensor Network, routing protocols, cooja simulator, network throughput
PDF Download (click here)
|