LITERATURETSURVEY
1.I.TF.TAkyildizTandTI.TH.TKasimoglu,TWirelessTsensorTandTactorTnetworks:TresearchTchallenges,TAdTHocTNetworks.
WirelessTsensorTandTactorTnetworksT(WSANs)TreferTtoTaTgroupTofTsensorsTandTactorsTlinkedTbyTwirelessTmediumTtoTperformTdistributedTsensingTandTactingTtasks.TTheTrealizationTofTwirelessTsensorTandTactorTnetworksT(WSANs)TneedsTtoTsatisfyTtheTrequirementsTintroducedTbyTtheTcoexistenceTofTsensorsTandTactors.TInTWSANs,TsensorsTgatherTinformationTaboutTtheTphysicalTworld,TwhileTactorsTtakeTdecisionsTandTthenTperformTappropriateTactionsTuponTtheTenvironment,TwhichTallowsTaTuserTtoTeffectivelyTsenseTandTactTfromTaTdistance.TInTorderTtoTprovideTeffectiveTsensingTandTacting,TcoordinationTmechanismsTareTrequiredTamongTsensorsTandTactors.TMoreover,TtoTperformTrightTandTtimelyTactions,TsensorTdataTmustTbeTvalidTatTtheTtimeTofTacting.TThisTpaperTexploresTsensor-actorTandTactor-actorTsynchronizationTandTdescribesTresearchTchallengeTforTcoordinationTandTcommunicationTproblems.
2.Y.TAkkaya,TKemalTandTMohamed,TCoverageTandTlatencyTawareTactorTplacementTmechanismsTinTwsans,TInternationalTJournalTofTSensorTNetworks.
InTWirelessTSensorTandTActorTNetworksT(WSANs),TresponsivenessTtoTseriousTeventsTisTofTutmostTimportanceTandTthus,TminimalTlatencyTshouldTbeTexperienced.TInTaddition,TsinceTtheseTactionsTcanTbeTtakenTatTanyTspotTwithinTtheTmonitoredTarea,TtheTactorsTshouldTprovideTmaximalTcoverageTofTtheTarea.TInTthisTpaper,TweTproposeTtwoTactorTplacementTmechanismsTforTWSANs,TnamelyTCOLATandTCOCOLATthatTconsiderTbothTtheTdelayTrequirementsTofTdataTcollectionTandTtheTcoverageTofTtheTarea.TCOLATevenlyTdistributesTtheTactorsTinTtheTregionTforTmaximisedTcoverageTfirst.TActorsTthenTcollaborativelyTformTclusters.TEachTindividualTactorTrepositionsTitselfTatTaTnewTlocationTthatTenablesTminimalTlatencyTinTcollectingTdataTinTitsTcluster.TCOCOLATisTanTextensionTtoTCOLATwhichTadditionallyTenforcesTconnectivityTamongTtheTactorsTbyTassigningTappropriateTlocationsTtoTeachTactorTforTimprovedTcoverageTandTreducedTlatency.TTheTeffectivenessTofTbothTapproachesTisTevaluatedTthroughTextensiveTsimulationTexperiments.
3.S.TG.TA,TH.TBozyigit,TandTF.TB.,TCluster-basedTcoordinationTandTroutingTframeworkTforTwirelessTsensorTandTactorTnetworks,TWirelessTCommunicationsTandTMobileTComputing.
InTWirelessTSensorTActorTNetworksT(WSAN),TsensorTnodesTperformTtheTsensingTtaskTandTactorTnodesTtakeTactionTbasedTonTtheTsensedTphenomena.TGenerally,TtheTnetworkTisTconfiguredTtoTobserveTmultipleTeventsTandTtoTreactTuponTeachTindividualTeventTaccordingly.TTimeTdelay,TenergyTefficiencyTandTreliabilityTareTthreeTimportantTaspectsTofTWSANTthatTrequireTspecialTattention.TToTensureTefficientTandTreliableToperationsTofTsuchTheterogeneousTWSAN,TnewTcommunicationTprotocolsTareTimperative.
InTthisTpaper,TweTproposeTanTintegratedTcluster?basedTcoordinationTandTroutingT(CCR)TframeworkTforTWSAN,TwhoseTprimeTobjectiveTisTtoTensureTreliableTactionTwithTefficientTenergyTconsumption.TInTCCR,TsensorTnodesTareTfirstTconfiguredTtoTformTclustersTbyTtakingTintoTaccountTtheTresidualTenergyTofTnodesTandTnetworkTdensity.TOnceTtheTclustersTareTformed,Tcluster?headsTcoordinateTwithTtheTactorsTtoTformTinteractiveTregions.TTheTreliabilityTofTactionTisTaddressedTinTtermsTofTinTtimeTdataTdeliveryTtoTactorsTinTinteractiveTregionsTandTactoractorTcoordinationTtoTmakeTsureTthatTanTactorTperformTactionTinTtheTreportedTregion.TATnovelTreal?timeTdataTaggregationT(RDA)TapproachTisTalsoTincorporatedTinTtheTframeworkTtoTconserveTenergyTbyTminimizingTtheTnumberTofTtransmissionsTandTachieveTfairness.
4.F.-H.TTseng,TL.-D.TChou,TandTH.-C.TChao,TATsurveyTofTblackTholeTattacksTinTwirelessTmobileTadThocTnetworks,THumanTcentricTComputingTandTInformationTSciences
TheTblackTholeTattackTisToneTofTtheTwell-knownTsecurityTthreatsTinTwirelessTmobileTadThocTnetworks.TTheTintrudersTutilizeTtheTloopholeTtoTcarryToutTtheirTmaliciousTbehaviorsTbecauseTtheTrouteTdiscoveryTprocessTisTnecessaryTandTinevitable.TManyTresearchersThaveTconductedTdifferentTdetectionTtechniquesTtoTproposeTdifferentTtypesTofTdetectionTschemes.TInTthisTpaper,TweTsurveyTtheTexistingTsolutionsTandTdiscussTtheTstate-of-the-artTroutingTmethods.TWeTnotTonlyTclassifyTtheseTproposalsTintoTsingleTblackTholeTattackTandTcollaborativeTblackTholeTattackTbutTalsoTanalyzeTtheTcategoriesTofTtheseTsolutionsTandTprovideTaTcomparisonTtable.TWeTexpectTtoTfurnishTmoreTresearchersTwithTaTdetailedTworkTinTanticipation.
5.L.TK.TBysaniTandTA.TK.TTuruk,TATsurveyTonTselectiveTforwardingTattackTinTwirelessTsensorTnetworks,TinTInternationalTConferenceTonTDevicesTandTCommunications.
WirelessTSensorTNetwork(WSN)TisTbeingTemergedTasTaTprevailingTtechnologyTinTfutureTdueTtoTitsTwideTrangeTofTapplicationsTinTmilitaryTandTcivilianTdomains.TTheseTnetworksTareTeasilyTproneTtoTsecurityTattacks,TsinceTonceTdeployedTtheseTnetworksTareTunattendedTandTunprotected.TSomeTofTtheTinherentTfeaturesTlikeTlimitedTbatteryTandTlowTmemoryTmakesTsensorTnetworksTinfeasibleTtoTuseTconventionalTsecurityTsolutions,TwhichTneedsTcomplexTcomputationsTandThighTmemory.TThereTareTlotTofTattacksTonTtheseTnetworksTwhichTcanTbeTclassifiedTasTroutingTattacksTandTdataTtrafficTattacks.TSomeTofTtheTdataTattacksTinTsensorTnodesTareTwormhole,TblackTholeTandTselectiveTforwardingTattack.TInTaTblackTholeTattack,TcompromisedTnodeTdropsTallTtheTpacketsTforwardingTthroughTit.TATspecialTcaseTofTblackTholeTattackTisTselectiveTforwardingTattack,TwhereTcompromisedTnodeTdropsTpacketsTselectively,TwhichTmayTdeteriorateTtheTnetworkTefficiency.TInTthisTpaper,TweTdiscussedTaboutTselectiveTforwardingTattackTandTsomeTofTtheTmitigationTschemesTtoTdefendTthisTattack.
6.Z.TKarakehayov,TUsingTrewardTtoTdetectTteamTblack-holeTattacksTinTwirelessTsensorTnetworks,TWksp.TReal-WorldTWirelessTSensorTNetworks.
WirelessTsensorTnetworksTconsistTofTautonomous,Tself-organizing,Tlow-powerTnodesTwhichTcollaborativelyTmeasureTdataTinTanTenvironmentTandTcooperateTtoTrouteTthisTdataTtoTitsTintendedTdestination.TBlackTholeTattacksTareTpotentiallyTdevastatingTattacksTonTwirelessTsensorTnetworksTinTwhichTaTmaliciousTnodeTusesTspuriousTrouteTupdatesTtoTattractTnetworkTtrafficTthatTitTthenTdrops.TWeTproposeTaTrobustTandTflexibleTattackTdetectionTschemeTthatTusesTaTwatchdogTmechanismTandTlightweightTexpertTsystemTonTeachTnodeTtoTdetectTanomaliesTinTtheTbehaviourTofTneighbouringTnodes.TUsingTthisTscheme,TevenTifTmaliciousTnodesTareTinsertedTintoTtheTnetwork,TgoodTnodesTwillTbeTableTtoTidentifyTthemTbasedTonTtheirTbehaviourTasTinferredTfromTtheirTnetworkTtraffic.TWeTexamineTtheTresource-preservingTmechanismsTofTourTsystemTusingTsimulationsTandTdemonstrateTthatTweTcanTallowTgroupsTofTnodesTtoTcollectivelyTevaluateTnetworkTtrafficTandTidentifyTattacksTwhileTrespectingTtheTlimitedThardwareTresourcesT(processing,TmemoryTandTstorage)TthatTareTtypicallyTavailableTonTwirelessTsensorTnetworkTnodes.