Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1393
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma, S-
dc.contributor.authorJena, S K-
dc.date.accessioned2011-02-25T09:30:22Z-
dc.date.available2011-02-25T09:30:22Z-
dc.date.issued2011-02-
dc.identifier.citationInternational Conference on Communication, Computing and Security, 2011 (ICCCS'11), P 565-568en
dc.identifier.isbn978-1-4503-0464-1/11/02-
dc.identifier.urihttp://hdl.handle.net/2080/1393-
dc.descriptionCopyright belongs to Proceedings Publisher- ACMen
dc.description.abstractWSNs usually deployed in the targeted area to monitor or sense the environment and depending upon the application sensor node transmit the data to the base station. To relay the data intermediate nodes communicate together, select appropriate routing path and transmit data towards the base station. Routing path selection depends on the routing protocol of the network. Base station should receive unaltered and fresh data. To fulfill this requirement, routing protocol should be energy-efficient and secure. Hierarchical or clusterbase routing protocol for WSNs is the most energy-efficient among other routing protocols. In this paper, we study different hierarchical routing technique for WSNs. Further we analyze and compare secure hierarchical routing protocols based on various criteria.en
dc.format.extent163668 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherACMen
dc.subjectWireless sensor networken
dc.subjectHierarchical (cluster-based) routingen
dc.subjectRouting securityen
dc.titleA Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networksen
dc.typeArticleen
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
p146-sharma.pdf159.83 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.