Investigating the Energy Efficient Routing Protocol for Wireless Sensor Networks
DOI:
https://doi.org/10.32628/IJSRST218274Keywords:
Black Hole Attack, MSN, Protocol, Energy, and ZBEEP.Abstract
A Wireless Sensor Network(WSN) consists of chain of sensors with capabilities of consuming energy for sensing, computing, and wireless communication to track physical device and relay their data to a base station cooperatively via the network. Efficient path for the processing of data in WSN and also to identify the active devices in the path. The ad-hoc networks which are active in WSN due to protocol, they facilitate versatility that often alters the topology. The Energy Efficient Zone based Routing Protocol (ZBEEP) which is the latest protocols in this direction, and the most common is On Demand Distance Vector Ad-hoc routing protocols. In ABODV and ZBEEP protocols using Network Simulator, I simulated this Black Hole Attack and tried that in the case of ZBEEP protocol the effect of energy due to Black Hole Attack is ineffective and better as compared to ABODV. I used two service quality metrics, such as Packet Transmission Ratio and Through-put, to help my opinions.
References
- K Sohraby,D Minoli,T Znati, Wireless Sensor Networks , Technology, Protocols, and Applications
- Getsy S Sara and D. Sridharan, Routing in mobile wireless sensor network: a survey, Springer, Aug. 2013.
- Faisal Bashir Hussain, Usama Ahmed, "Energy Efficient Routing Protocol for Zone Based Mobile Sensor Networks ", IEEE 2011, pp.1081-1086.
- A. K. Sadek, W. Su, and K. J. R. Liu, Multi-node cooperative communications in wireless networks, IEEE Trans. Signal Processing, vol. 55, no. 1, pp. 341-355, 2007 .
- Nikolaos A. Pantazis, Stefanos A. Nikolidakis and Dimitrios D. Vergados , "Energy-E cient Routing Protocols in Wireless Sensor Networks: A Sur-vey" , IEEE Communications Surveys and Tutorials, VOL.15, NO. 2,Second Quarter 2013.
- J R Srivastava, TSB Sudarshan ,ZEEP: Zone based Energy E cient Rout-ing Protocol for Mobile Sensor Networks , IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCl) , 2013 .
- P. Yau and C. J. Mitchell, Security Vulnerabilities in Adhoc Network.
- G. Vigna, S. Gwalani and K. Srinivasan, An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks, Proc. of the 20th Annual Com-puter Security Applications Conference (ACSAC04).
- G. Padmavathi and D. Shanmugapriya A Survey of Attacks, Security Mech-anisms and Challenges in Wireless Sensor Networks.
- B Kannhavong, H Nakayama, Y Nemoto, N Kato, A Jamalipour, A Survey Of Routing Attacks In Mobile Ad hoc Networks , IEEE Wireless Commu-nications.
- Virtual InterNetwork Testbed, http://www.isi.edu/nsnam/vint, The NS Manual.
- http://www.isi.edu/nsnam/ns/doc/nsdoc.pdf .
- http://www.isi.edu/nsnam/ns/.
- https://en.wikipedia.org/wiki/Wireless_sensor_network
- https://ns2code.com/ns2-black-hole-attack
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.