Open Access   Article Go Back

Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks

S. Sahana1 , V. Vinothini2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 243-245, Feb-2019

Online published on Feb 28, 2019

Copyright © S. Sahana, V. Vinothini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Sahana, V. Vinothini, “Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.243-245, 2019.

MLA Style Citation: S. Sahana, V. Vinothini "Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks." International Journal of Computer Sciences and Engineering 07.04 (2019): 243-245.

APA Style Citation: S. Sahana, V. Vinothini, (2019). Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks. International Journal of Computer Sciences and Engineering, 07(04), 243-245.

BibTex Style Citation:
@article{Sahana_2019,
author = {S. Sahana, V. Vinothini},
title = {Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {243-245},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=763},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=763
TI - Delay Sensitive Energy Management Clusterhead Routing Protocol for Securing Underwater Acoustic Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S. Sahana, V. Vinothini
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 243-245
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Underwater sensor network consists of number of various sensors and autonomous underwater vehicles deployed underwater to coordinate, interact and share information among them to carry out sensing and monitoring functions. Underwater environment differs from terrestrial radio environment both in terms of energy costs and channel propagation phenomena. The goal of the project is to reduce the occurrence of delays and attacks, during data transmission among sensor nodes in under water acoustic sensor network by introducing a protocol called delay sensitive energy management cluster head routing protocol in order to enhance the energy efficiency of the sensor network.

Key-Words / Index Term

Underwater , Delays And Attacks , Sensor Network

References

[1]. Manjula, R.B. and Sunilkumar, S. M. (2011)Issues in Underwater Acoustic Sensor Networks‟, International Journalof Computer and Electrical Engineering, Vol.3, No.1, pp.101-110.
[2]. Akyildiz, I. F., Pompili,D., Melodia, T.(2006) State of the Art in Protocol Research for Underwater Acoustic Sensor Networks,The First ACM International Workshop on UnderWater Networks (WUWNet06) 2006, Los Angeles, California, USA,pp.7-17.
[3]. Liu, L., Zhou, S., and Cui, J. H., (2008)
[4]. “Prospects and Problems of Wireless Communication for Underwater Sensor Networks”, WILEY WCMC, Vol. 8, Pages977-994.
[5]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422,Mar. 2002.
[6]. A. Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,” Computer Networks, vol. 56, no. 7, pp. 1951–1967, May.2012.
[7]. T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen- sor networks using randomized dispersive routes,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp.941–954,
[8]. Jul. 2010.
[9]. P. Papadimitratos, J. Luo, and J. P. Hubaux, “A randomized coun- termeasure against parasitic adversaries in wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 1036–1045, Sep.2010.