Greedy Perimeter Vector Routing Protocol in Underwater Acoustic WSN using NS2

  • Mohit, Dr. Pawan Kumar, Dr. Sandeep Tayal, Dr. Deepak Goyal, Dr. Monika Goyal

Abstract

There are huge opportunities lie in underwater scenario in various domain. Nowadays WSN face security is one of the crucial parameters along with energy consumption. There are many energy efficient algorithms which can be used for data aggregation along with robust security so that crucial information cannot be accessed by malicious node. It is a robust mechanism to harvest energy and delay assist security in WSN. In our research work complex SEEC protocol is designed in such a way that it benefits us in data aggregation as well as in security. In this protocol a backup cluster head is installed to handle all operation in adverse circumstances like faliure of main CH. Therefore backup CH would not allow any interruption and all the operation will be executed timely. Our proposed advanced SEEC protocol based upon clustering depicted better outcome in networking domain than implemented work than reference work. Further more robust protocols and algorithms can be deploy to enhancement in security as well as to make network energy efficient

Published
2020-06-06
How to Cite
Mohit, Dr. Pawan Kumar, Dr. Sandeep Tayal, Dr. Deepak Goyal, Dr. Monika Goyal. (2020). Greedy Perimeter Vector Routing Protocol in Underwater Acoustic WSN using NS2. International Journal of Advanced Science and Technology, 29(04), 9425 -. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/30853