LITERATURE SURVEY Essay

LITERATURETSURVEY

1.I.TF.TAkyildizTandTI.TH.TKasimoglu,T“WirelessTsensorTandTactorTnetworks:TresearchTchallenges,”TAdTHocTNetworks.

WirelessTsensorTandTactorTnetworksT(WSANs)TreferTtoTaTgroupTofTsensorsTandTactorsTlinkedTbyTwirelessTmediumTtoTperformTdistributedTsensingTandTactingTtasks.TTheTrealizationTofTwirelessTsensorTandTactorTnetworksT(WSANs)TneedsTtoTsatisfyTtheTrequirementsTintroducedTbyTtheTcoexistenceTofTsensorsTandTactors.TInTWSANs,TsensorsTgatherTinformationTaboutTtheTphysicalTworld,TwhileTactorsTtakeTdecisionsTandTthenTperformTappropriateTactionsTuponTtheTenvironment,TwhichTallowsTaTuserTtoTeffectivelyTsenseTandTactTfromTaTdistance.TInTorderTtoTprovideTeffectiveTsensingTandTacting,TcoordinationTmechanismsTareTrequiredTamongTsensorsTandTactors.TMoreover,TtoTperformTrightTandTtimelyTactions,TsensorTdataTmustTbeTvalidTatTtheTtimeTofTacting.TThisTpaperTexploresTsensor-actorTandTactor-actorTsynchronizationTandTdescribesTresearchTchallengeTforTcoordinationTandTcommunicationTproblems.

2.Y.TAkkaya,TKemalTandTMohamed,T“CoverageTandTlatencyTawareTactorTplacementTmechanismsTinTwsans,”TInternationalTJournalTofTSensorTNetworks.

InTWirelessTSensorTandTActorTNetworksT(WSANs),TresponsivenessTtoTseriousTeventsTisTofTutmostTimportanceTandTthus,TminimalTlatencyTshouldTbeTexperienced.TInTaddition,TsinceTtheseTactionsTcanTbeTtakenTatTanyTspotTwithinTtheTmonitoredTarea,TtheTactorsTshouldTprovideTmaximalTcoverageTofTtheTarea.TInTthisTpaper,TweTproposeTtwoTactorTplacementTmechanismsTforTWSANs,TnamelyTCOLATandTCOCOLATthatTconsiderTbothTtheTdelayTrequirementsTofTdataTcollectionTandTtheTcoverageTofTtheTarea.TCOLATevenlyTdistributesTtheTactorsTinTtheTregionTforTmaximisedTcoverageTfirst.TActorsTthenTcollaborativelyTformTclusters.TEachTindividualTactorTrepositionsTitselfTatTaTnewTlocationTthatTenablesTminimalTlatencyTinTcollectingTdataTinTitsTcluster.TCOCOLATisTanTextensionTtoTCOLATwhichTadditionallyTenforcesTconnectivityTamongTtheTactorsTbyTassigningTappropriateTlocationsTtoTeachTactorTforTimprovedTcoverageTandTreducedTlatency.TTheTeffectivenessTofTbothTapproachesTisTevaluatedTthroughTextensiveTsimulationTexperiments.

3.S.TG.TA,TH.TBozyigit,TandTF.TB.,T“Cluster-basedTcoordinationTandTroutingTframeworkTforTwirelessTsensorTandTactorTnetworks,”TWirelessTCommunicationsTandTMobileTComputing.

InTWirelessTSensorTActorTNetworksT(WSAN),TsensorTnodesTperformTtheTsensingTtaskTandTactorTnodesTtakeTactionTbasedTonTtheTsensedTphenomena.TGenerally,TtheTnetworkTisTconfiguredTtoTobserveTmultipleTeventsTandTtoTreactTuponTeachTindividualTeventTaccordingly.TTimeTdelay,TenergyTefficiencyTandTreliabilityTareTthreeTimportantTaspectsTofTWSANTthatTrequireTspecialTattention.TToTensureTefficientTandTreliableToperationsTofTsuchTheterogeneousTWSAN,TnewTcommunicationTprotocolsTareTimperative.

InTthisTpaper,TweTproposeTanTintegratedTcluster?basedTcoordinationTandTroutingT(CCR)TframeworkTforTWSAN,TwhoseTprimeTobjectiveTisTtoTensureTreliableTactionTwithTefficientTenergyTconsumption.TInTCCR,TsensorTnodesTareTfirstTconfiguredTtoTformTclustersTbyTtakingTintoTaccountTtheTresidualTenergyTofTnodesTandTnetworkTdensity.TOnceTtheTclustersTareTformed,Tcluster?headsTcoordinateTwithTtheTactorsTtoTformTinteractiveTregions.TTheTreliabilityTofTactionTisTaddressedTinTtermsTofTinTtimeTdataTdeliveryTtoTactorsTinTinteractiveTregionsTandTactor–actorTcoordinationTtoTmakeTsureTthatTanTactorTperformTactionTinTtheTreportedTregion.TATnovelTreal?timeTdataTaggregationT(RDA)TapproachTisTalsoTincorporatedTinTtheTframeworkTtoTconserveTenergyTbyTminimizingTtheTnumberTofTtransmissionsTandTachieveTfairness.

4.F.-H.TTseng,TL.-D.TChou,TandTH.-C.TChao,T“ATsurveyTofTblackTholeTattacksTinTwirelessTmobileTadThocTnetworks,”THumanTcentricTComputingTandTInformationTSciences

TheTblackTholeTattackTisToneTofTtheTwell-knownTsecurityTthreatsTinTwirelessTmobileTadThocTnetworks.TTheTintrudersTutilizeTtheTloopholeTtoTcarryToutTtheirTmaliciousTbehaviorsTbecauseTtheTrouteTdiscoveryTprocessTisTnecessaryTandTinevitable.TManyTresearchersThaveTconductedTdifferentTdetectionTtechniquesTtoTproposeTdifferentTtypesTofTdetectionTschemes.TInTthisTpaper,TweTsurveyTtheTexistingTsolutionsTandTdiscussTtheTstate-of-the-artTroutingTmethods.TWeTnotTonlyTclassifyTtheseTproposalsTintoTsingleTblackTholeTattackTandTcollaborativeTblackTholeTattackTbutTalsoTanalyzeTtheTcategoriesTofTtheseTsolutionsTandTprovideTaTcomparisonTtable.TWeTexpectTtoTfurnishTmoreTresearchersTwithTaTdetailedTworkTinTanticipation.

5.L.TK.TBysaniTandTA.TK.TTuruk,T“ATsurveyTonTselectiveTforwardingTattackTinTwirelessTsensorTnetworks,”TinTInternationalTConferenceTonTDevicesTandTCommunications.

WirelessTSensorTNetwork(WSN)TisTbeingTemergedTasTaTprevailingTtechnologyTinTfutureTdueTtoTitsTwideTrangeTofTapplicationsTinTmilitaryTandTcivilianTdomains.TTheseTnetworksTareTeasilyTproneTtoTsecurityTattacks,TsinceTonceTdeployedTtheseTnetworksTareTunattendedTandTunprotected.TSomeTofTtheTinherentTfeaturesTlikeTlimitedTbatteryTandTlowTmemoryTmakesTsensorTnetworksTinfeasibleTtoTuseTconventionalTsecurityTsolutions,TwhichTneedsTcomplexTcomputationsTandThighTmemory.TThereTareTlotTofTattacksTonTtheseTnetworksTwhichTcanTbeTclassifiedTasTroutingTattacksTandTdataTtrafficTattacks.TSomeTofTtheTdataTattacksTinTsensorTnodesTareTwormhole,TblackTholeTandTselectiveTforwardingTattack.TInTaTblackTholeTattack,TcompromisedTnodeTdropsTallTtheTpacketsTforwardingTthroughTit.TATspecialTcaseTofTblackTholeTattackTisTselectiveTforwardingTattack,TwhereTcompromisedTnodeTdropsTpacketsTselectively,TwhichTmayTdeteriorateTtheTnetworkTefficiency.TInTthisTpaper,TweTdiscussedTaboutTselectiveTforwardingTattackTandTsomeTofTtheTmitigationTschemesTtoTdefendTthisTattack.

6.Z.TKarakehayov,T“UsingTrewardTtoTdetectTteamTblack-holeTattacksTinTwirelessTsensorTnetworks,”TWksp.TReal-WorldTWirelessTSensorTNetworks.

WirelessTsensorTnetworksTconsistTofTautonomous,Tself-organizing,Tlow-powerTnodesTwhichTcollaborativelyTmeasureTdataTinTanTenvironmentTandTcooperateTtoTrouteTthisTdataTtoTitsTintendedTdestination.TBlackTholeTattacksTareTpotentiallyTdevastatingTattacksTonTwirelessTsensorTnetworksTinTwhichTaTmaliciousTnodeTusesTspuriousTrouteTupdatesTtoTattractTnetworkTtrafficTthatTitTthenTdrops.TWeTproposeTaTrobustTandTflexibleTattackTdetectionTschemeTthatTusesTaTwatchdogTmechanismTandTlightweightTexpertTsystemTonTeachTnodeTtoTdetectTanomaliesTinTtheTbehaviourTofTneighbouringTnodes.TUsingTthisTscheme,TevenTifTmaliciousTnodesTareTinsertedTintoTtheTnetwork,TgoodTnodesTwillTbeTableTtoTidentifyTthemTbasedTonTtheirTbehaviourTasTinferredTfromTtheirTnetworkTtraffic.TWeTexamineTtheTresource-preservingTmechanismsTofTourTsystemTusingTsimulationsTandTdemonstrateTthatTweTcanTallowTgroupsTofTnodesTtoTcollectivelyTevaluateTnetworkTtrafficTandTidentifyTattacksTwhileTrespectingTtheTlimitedThardwareTresourcesT(processing,TmemoryTandTstorage)TthatTareTtypicallyTavailableTonTwirelessTsensorTnetworkTnodes.

Still stressed from student homework?
Get quality assistance from academic writers!