An Efficient and Dynamic Path Reconstruction in Wireless Networks
Main Article Content
Abstract
In Big-scale multi-hop wireless sensor networks (WSNs) for informationgathering is the ability of monitoring
per-packet routing paths at the destination is essential in better understanding network dynamics, and better routing
protocols, topology control, energy consumption, duplicate detection, and load balance in WSN deployments. We
first devise a basic Routing Topology Recovery (RTR) algorithm with the measurement metric of modular
summation and illustrate how basic RTR algorithm works the path determining process from source to destination
for data transmission is generally known as routing. In most WSNs routing of incoming data can be determined by
the network layer. The SNs at the source cannot reach the sink node directly in multi-hop networks, hence
intermediate SNs need to relay their respective packets. Mainly the routing path of every packet is helpful in
understanding the network performance.We present SANA secure Ad hoc Network Architecture. Its goal lies in
managing adaptively preventive, reactive and tolerant security mechanisms to provide essential services even under
attacks, intrusions or failures. The results reveal that our approach significantly outperforms other state-of-the-art
methods including MNT, Pathfinder, and CSPR. Furthermore, we validate our method intensively with a real-world
outdoor WSN deployment running collection tree protocol for environmental data collection.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.