MITS5003 Wireless Networks: Routing Protocols Analysis and Review

Verified

Added on  2022/08/27

|9
|2141
|15
Report
AI Summary
This report provides an overview of routing protocols within wireless sensor networks (WSNs), focusing on data transmission and network design. It reviews a research article discussing data-centric, hierarchical, and geographic routing protocols, evaluating their methodologies, advantages, and disadvantages. The report highlights the importance of routing protocols for effective data communication and explores design challenges, including node distribution, data reporting techniques, and security vulnerabilities, emphasizing the need for improvements in QoS service, energy efficiency, and data privacy. It concludes with suggestions for future research, including a focus on security concerns and the inclusion of surveys to gather fresh information, and provides effective mitigation techniques to enhance data security against cyber-crimes and attacks.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
WIRELESS NETWORK 0
An Overview of Routing
Protocols on Wireless Sensor
Network
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WIRELESS NETWORK 1
Table of Contents
Introduction.................................................................................................................................................2
Introduction to the paper............................................................................................................................2
Description of the methodologies...............................................................................................................3
Comparison of the results...........................................................................................................................3
Advantages and disadvantages of the methodology...................................................................................4
Suggestions..................................................................................................................................................5
Conclusion...................................................................................................................................................5
References...................................................................................................................................................7
Document Page
WIRELESS NETWORK 2
Introduction
Wireless sensor networks are capable to provide a way where users may complete data
transmission in an appropriate manner. A routing protocol is an effective technique utilized
in the wireless sensor network [1]. It is argued that wireless sensor network is a multi-hop
network by conveying signal between themselves which is poised of a huge amount of
sensor bulges with the wireless transmission. This report will evaluate the key aspects of
wireless sensor networks and review a research paper related to the research topic.
Introduction to the paper
The chosen article for this research is “An Overview of Routing Protocols on Wireless
Sensor Network” that was written by Xiang and Dengteng in the year 2015 [1]. The
intention of the chosen article is to determine the concept of wireless sensor networks
(WSN) and identify the significance of routing protocols on wireless networks. The
researchers reported that routing protocol is the best process utilized in the WSN. In this
paper, the investigators classified the routing protocols in major three parts including data-
centric, hierarchical and geographic routing protocols [2]. Moreover, this paper discussed
the design trials of routing procedure and drawbacks associated with the routing protocols.
With the implementation of the mechanical network, the costless, multi-feature nodes are
implemented and the low-cost wireless sensor networks emerge at the historic moment.
The researchers argued that the key occupation of the routing etiquette is to examine the
best route among the sink nodes and sensor nodes [3]. It is reported that there are major
three factors that impact on the designing of the routing protocols for example, device
nodes’ liveliness, and reminiscence stuff and communicati0n radius. The investigators
identified that there are four data reporting techniques used in the routing protocols for
example, time-driven, query-driven, event-driven and mixed-mode. In this research paper,
the writers included viewpoints of other investigators and highlighted the different types
of routing conventions used in the WSN.
Document Page
WIRELESS NETWORK 3
Description of the methodologies
It is argued that research methodology is a key part of the investigation that helps to
complete the research in the right direction and increase research quality [4]. From the
chosen paper it is examined that the writers adopted various kinds of methodologies in the
research for example, qualitative design, research approach, philosophy, data analysis and
many more [4]. The qualitative is the best design used by the researcher that provided a
way to manage the flow of information in the study. It is found that the researchers used
the inductive approach and interpretivism philosophy for addressing the research
concerns and achieving objectives of the studies. For obtaining data a secondary method is
adopted by which the writers included appropriate facts related to the routing protocols
and wireless networks. Moreover, the investigators included opinions of other writers and
reviewed the findings of recent papers. Content analysis is the best technique that helped
to resolve the research queries and manage the flow of data in the entire paper [5].
Comparison of the results
From this investigation, it is found that the traditional routing protocols may not apply to
the WSNs due to the restriction of sensor nodes and performance-related issues [6]. There
are numerous factors involved while designing routing protocols for example, node
distribution strategy and data reporting technique and many more. While comparing with
other studies the selected paper provided each and every point related to routing protocols
and wireless sensor networks. The previous studies provided less information about
routing protocols but this investigation helped to understand the fundamental concept
behind wireless sensor networks and routing protocols [7]. In this investigation, the
researchers discussed and evaluated the design issues associated with the routing
protocols along with the benefits and drawbacks of the routing protocols.
Numerous advanced routing protocols were developed in the last few years but there are
still several issues that need to be managed including balance among QoS service and
energy efficiency and security-related problems [8]. It is true that lack of security is a major
issue that needs to be handled by the consumers while implementing routing procedures in
the WSN. The recent study examined that wireless sensor networks require a huge data
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WIRELESS NETWORK 4
conversation and some info collected by nodes are useless [9]. On the premise of the
wireless sensor networks, enhancing the algorithm to filter the jobless and useless
information or facts are better resolutions.
This proposed research identified that data exchanged in the WSNs are vulnerable to
malware threats. The data packages transmitted from the source node to object node which
may be snooped, data alteration and so on. Therefore, researching on the privacy of data in
the WSN network is inevitable. It is found that the sensor nodes mainly organized without
physical observation in the WSNs [10]. The data-centric protocol focuses on the sensory
information as compared with the other protocols and it is not depended on the unique
identification in the entire network. The recent study provided less detail of the different
types of routing procedures used in the wireless sensor networks but this paper provided
complete data about wireless sensor networks.
Geographic routing protocols are developed by the geographic information of sensor
nodes. It is observed that the routing protocols have good extensibility [11]. The
researchers reported that in the case of data transmission, only part of nodes takes part in
the route assortment and data getting process. Therefore, the proposed investigation
helped to solve the research gaps occurred in the recent studies and managed the flow of
information in the entire paper.
Benefits and drawbacks of the methodology
It is observed that the investigators adopted numerous methodologies and techniques
while conducting the research and managed the quality of the study. It is found that
adopted methodologies ate helpful for the research that provided a way where the
researchers achieved objectives in less time and evaluated the types of routing procedures
used in the WSN [12]. There are other advantages of chosen methodologies such as
condensed investigation gaps, enhanced the level of research, helped to solve research gaps
of the recent studies, maintained the flow of information and many more. However, the
chosen methodologies provided theoretical data to the researchers that did not provide
reliable information and the researchers concluded points based on the recent studies
which may produce gaps in the investigation. Moreover, qualitative data provided fewer
Document Page
WIRELESS NETWORK 5
facts related to the research concerns and did not elaborate on the security points in the
case of routing protocols. All these are major disadvantages of the selected methodologies
that will be addressed in future research.
Suggestions
It is reported that the chosen paper provided theoretical facts related to the routing
protocols and wireless sensor networks that affected the research quality. The future
investigation will focus on both theoretical and numerical data and provide data obtained
from the survey and focus groups. It is examined that the researchers did not explore
security challenges and vulnerabilities associated with the wireless sensor networks and
routing protocols that produced gaps in the readers [12]. The future work will focus on
security concerns and provide more information about security vulnerabilities by which
readers can aware of the cyber-crimes and attacks. Moreover, numerous mitigation
techniques will be included for enhancing the privacy of data in the routing protocols and
several recommendations will be provided in the context of security concerns and
problems.
Conclusion
It can be concluded that routing protocol is the best technique used in the wireless sensor
networks for providing effective data communication to the consumers. This report
reviewed a journal article that highlighted the different types of routing protocols used in
the WSNs. The chosen paper adopted effective methodologies that helped to manage the
quality of data and resolved the research concerns effectively. It is identified that numerous
routing protocols were developed in the last five years but there are still numerous issues
unsolved including quality of service and security. Moreover, data exchanged process in the
WSNs are vulnerable to malware threats. The major disadvantage of the chosen
methodologies is that they provided theoretical information about routing protocols that
produced research gaps in the readers. The future research will resolve such issues and
include a survey through questionnaire for obtaining fresh information about routing
protocols. Moreover, the researchers will include security threats and risks occur in the
Document Page
WIRELESS NETWORK 6
routing protocols and provide effective mitigation techniques where companies can protect
data against the cyber-crimes and attacks.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WIRELESS NETWORK 7
References
[1].X., Yang, D. Deng and, M., Liu, “An overview of routing protocols on Wireless Sensor
Network,” In 2015 4th International Conference on Computer Science and Network
Technology (ICCSNT), Vol. 1, no. 1, pp. 1000-1003, 2015.
[2].N., Li, J.F., Martínez, J. Meneses and M., Eckert, “A survey on underwater acoustic
sensor network routing protocols,” Sensors, vol. 16, no. 3, p.414, 2016.
[3].G., Han, J., Jiang, M. Guizani and, J.J.C., Rodrigues, “Green routing protocols for
wireless multimedia sensor networks,” IEEE Wireless Communications, vol. 23, no. 6,
pp.140-146, 2016.
[4].T., Abdelkader, K., Naik, A., Nayak, N. Goel and, V., Srivastava, “A performance
comparison of delay-tolerant network routing protocols,” IEEE Network, vol. 30, no.
2, pp.46-53, 2016.
[5].J. Jiang and, G., Han, “Routing protocols for unmanned aerial vehicles,” IEEE
Communications Magazine, vol. 56, no. 1, pp.58-63, 2018.
[6].S.M., Ghoreyshi, A. Shahrabi and, T., Boutaleb, “Void-handling techniques for routing
protocols in underwater sensor networks: Survey and challenges,” IEEE
Communications Surveys & Tutorials, vol. 19, no. 2, pp.800-827, 2017.
[7].M., Hollick, C., Nita-Rotaru, P., Papadimitratos, A. Perrig and, S., Schmid, “Toward a
taxonomy and attacker model for secure routing protocols,” ACM SIGCOMM
Computer Communication Review, vol. 47, no. 1, pp.43-48, 2017.
[8].P. Nayak and, B., Vathasavai, “Impact of random mobility models for reactive routing
protocols over MANET,” International Journal of Simulation--Systems, Science &
Technology, vol. 17, no. 34, pp.112-115, 2016.
[9].A.A., Khan, M.H. Rehmani and, M., Reisslein, “Requirements, design challenges, and
review of routing and MAC protocols for CR-based smart grid systems,” IEEE
Communications Magazine, vol. 55, no. 5, pp.206-215, 2017.
[10]. M., Hammoudeh, F., Al-Fayez, H., Lloyd, R., Newman, B., Adebisi, A. Bounceur
and, A., Abuarqoub, “A wireless sensor network border monitoring system:
Document Page
WIRELESS NETWORK 8
Deployment issues and routing protocols,” IEEE Sensors Journal, vol. 17, no. 8,
pp.2572-2582, 2017.
[11]. A.B., Usman, J.A. Gutierrez and, A.B., Bichi, “Secure Routing Protocols Using
Trust-Based Mechanisms in the Internet of Things for Smart City Environment
Challenges and Future Trends,” In Secure Cyber-Physical Systems for Smart Cities, vol.
12, no. 6, pp. 103-129, 2019.
[12]. O.S., Oubbati, A., Lakas, F., Zhou, M. Güneş and, M.B., Yagoubi, “A survey on
position-based routing protocols for Flying Ad hoc Networks (FANETs),” Vehicular
Communications, vol. 10, no. 5, pp.29-56, 2017.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]