UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 8
August-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2008214


Registration ID:
236258

Page Number

1648-1653

Share This Article


Jetir RMS

Title

Analysis of Security Threats Analysis under LEACH Routing Protocol for WSN and DTN

Abstract

The routing protocol is a process to select suitable path for the data to travel from source to destination. The process encounters several difficulties while selecting the route, which depends upon, type of network, channel characteristics and the performance metrics. The data sensed by the sensor nodes in a wireless sensor network (WSN) is typically forwarded to the base station that connects the sensor network with the other networks (may be internet) where the data is collected, analyzed and some action is taken accordingly. In very small sensor networks where the base station and motes (sensor nodes) so close that they can communicate directly with each other than this is single-hop communication but in most WSN application the coverage area is so large that requires thousands of nodes to be placed and this scenario requires multi-hop communication because most of the sensor nodes are so far from the sink node (gateway) so that they cannot communicate directly with the base station. The single-hop communication is also called direct communication and multi-hop communication is called indirect communication. In multi-hop communication the sensor nodes not only produce and deliver their material but also serve as a path for other sensor nodes towards the base station. The process of finding suitable path from source node to destination node is called routing and this is the primary responsibility of the network layer.

Key Words

Security Threats, LEACH Routing Protocol for WSN and DTN

Cite This Article

"Analysis of Security Threats Analysis under LEACH Routing Protocol for WSN and DTN", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 8, page no.1648-1653, August-2020, Available :http://www.jetir.org/papers/JETIR2008214.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Analysis of Security Threats Analysis under LEACH Routing Protocol for WSN and DTN", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 8, page no. pp1648-1653, August-2020, Available at : http://www.jetir.org/papers/JETIR2008214.pdf

Publication Details

Published Paper ID: JETIR2008214
Registration ID: 236258
Published In: Volume 7 | Issue 8 | Year August-2020
DOI (Digital Object Identifier):
Page No: 1648-1653
Country: kupwara, j&k, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003044

Print This Page

Current Call For Paper

Jetir RMS