作者: Prabhjot Kaur , Mandeep Kaur
DOI: 10.5120/21579-4644
关键词:
摘要: In wireless sensor networks messages are sent from source to sink, but it sometime becomes a risky communication way because of presence eavesdropper. During transfer packet or message sink an eavesdropper may attack on the network and creates problem for sender receiver, as trace path detect location very easily. Because this security is always remained concern topic in networks. Different techniques introduced time protection I n paper we have also scheme privacy. This technique especially effective when will try locate by using DREAM protocol. deviate information false identity nodes provided which can confuse attacker protects our well sink. The these having identical capabilities energy called homogeneous (8). These types be again classified into flat hierarchy topology. topology that sensors close static consumes more than at margin network. drawbacks overcome hierarchical i.e., clusters. this, group forms lower layer cluster heads higher (4). Cluster head, collects data layers then forwards head acts aggregation point. Since collecting nodes, other nodes. So, rotated dynamically avoid consumption. Heterogeneous small number resource rich large limited basic powerful transceivers batteries. heads. capabilities. Mobile Data Gathering consists one Collectors (MC's) collector device equipped with transceiver high battery power. It gathers short-range communications. MC roams over sensing field while moving pause some points its sensors. To attain maximum saving, mobile must travel transmission range each node field. helps collect packets single hop. random planned. mobility reduces consumption