This paper is published in Volume-4, Issue-4, 2018
Area
Computer Science
Author
Yudhvir Kumar, Tarun Dalal
Org/Univ
CBS Group of Institution, Jhajjar, Haryana, India
Pub. Date
13 July, 2018
Paper ID
V4I4-1240
Publisher
Keywords
Data aggregation, Hop, Cluster, WSN, Strategies, Protocol

Citationsacebook

IEEE
Yudhvir Kumar, Tarun Dalal. Survey paper on data aggregation in MANET with advance security protocol using NS2, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Yudhvir Kumar, Tarun Dalal (2018). Survey paper on data aggregation in MANET with advance security protocol using NS2. International Journal of Advance Research, Ideas and Innovations in Technology, 4(4) www.IJARIIT.com.

MLA
Yudhvir Kumar, Tarun Dalal. "Survey paper on data aggregation in MANET with advance security protocol using NS2." International Journal of Advance Research, Ideas and Innovations in Technology 4.4 (2018). www.IJARIIT.com.

Abstract

Wireless sensor networks (WSNs) consist of sensor nodes and these nodes can vary from a few numbers to a highly dense number. Data aggregation is a very important technique in wireless sensor networks through which diverse parameters performance can be increased effectively. Energy consumption by nodes can be decreased using data aggregation technique by eliminating redundancy because these parameters play a vital role in MANET. Wireless sensor nodes are very tiny in size and have limited processing capability very low battery power. This diminution of low battery power makes the sensor network vulnerable to failure. Sensor networks consist of several sensor nodes which co-operatively send sensed data to base station. One of the critical constraints of sensor nodes is the power consumption requirement. As sensor nodes are battery driven, an efficient utilization of power is essential to reduce data traffic inside sensor networks thus reduce the amount of data that need to send to base station thereby enhancing the network lifetime. In this survey paper, our main focus is to know data aggregation, data aggregation strategies, private key, public key, and security concept how to data can be a guard from hackers or malicious nodes. Networks have huge application in habitat monitoring, disaster management, security, and military, etc.