Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

A Statistical Analysis of Various Routing Protocols in WSN

IJCA Proceedings on National Conference on Recent Trends in Computer Science and Information Technology
© 2016 by IJCA Journal
NCRTCSIT 2016 - Number 2
Year of Publication: 2016
Vijaykumar Dixit

Vijaykumar Dixit. Article: A Statistical Analysis of Various Routing Protocols in WSN. IJCA Proceedings on National Conference on Recent Trends in Computer Science and Information Technology NCRTCSIT 2016(2):10-13, June 2016. Full text available. BibTeX

	author = {Vijaykumar Dixit},
	title = {Article: A Statistical Analysis of Various Routing Protocols in WSN},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computer Science and Information Technology},
	year = {2016},
	volume = {NCRTCSIT 2016},
	number = {2},
	pages = {10-13},
	month = {June},
	note = {Full text available}


The network in which different type of devices such as PDA, laptop, tablets, cell phone etc are established a network for dispense information, communication and distributing files between nodes is called heterogeneous wireless network. In the heterogeneous wireless network the important problem is behavior of nodes . the nodes between sources to destination not only different hardware, energy capabilities but also may pursue different goals. The entrusted (malfunctioned) nodes drop the packet between source to destination and breaks the routing path . due to faulty hardware or software and responsible for disturbing the data transmission in the network . Here, we develop fuzzy rule based secure and reliable routing protocol for heterogeneous wireless network we used AODV as a based routing protocol so that in future if new nodes are inserted or any node is deleted in the network then our network does not disturb . we also used ESTAR protocol for finding the trusted based and energy aware nodes. ESTAR not only evaluates the node competency as well as reliability in relaying the packet with multidimensional trust values. We used this highly trusted node which has sufficient energy to reduce probability of breaking the routs due to the ESTAR routing protocol. the packet delivery ratio and routs stability is improved the trusted value of node calculated by the ESTAR based on the parameter of number of packets ,percent of sessions and the node ability to keep route connected which is theoretically possible but practically this wireless network parameter do not have a single valued but a set of value from which a decision has to takes place therefore we pass this trusted value to fuzzy ruled base and get practically possible trust nodes.


  • G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-Hop Relay for Next-Generation Wireless AccessNetworks", Bell Labs Technical , vol. 13, no. 4, pp. 175-193, 2009.
  • C. Chou, D. Wei, C. Kuo, and K. Naik, "An EfficientAnonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks", IEEE J. Selected Areas in Comm. , vol. 25, no. 1, Jan. 2007.
  • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Mis- behavior in Mobile Ad Hoc Networks", Proc. ACM MobiCom'00, pp. 255-265, Aug. 2000.
  • X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, "Autoregressive Trust Management in Wireless Ad Hoc Networks", Ad Hoc & Sensor WirelessNetworks, vol. 16, no. 1-3, pp. 229-242, 2012.
  • G. Indirania and K. Selvakumara, "A Swarm-BasedEfficient Dis- tributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET)", Int'l J. Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103, 2014.
  • H. Li and M. Singhal, "Trust Management inDistributed Sys- tems", Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007.
  • S. Zhong, J. Chen, and R. Yang, "Sprite: A Simple,Cheat-Proof, Credit Based System for Mobile Ad-HocNetworks", Proc. IEEE INFOCOM '03, vol. 3, pp. 1987-1997, Mar. /Apr. 2003.
  • M. Mahmoud and X. Shen, "PIS: A Practical Incentive System For Multi-Hop Wireless Networks", IEEETrans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
  • M. Mahmoud and X. Shen, "ESIP: Secure IncentiveProtocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks", IEEE Trans.
  • Mobile Computing, vol. 10, no. 7, pp. 997- 1010, July 2011.
  • M. Mahmoud and X. Shen, "An Integrated Stimulation and Pun- ishment Mechanism for Thwarting Packet Drop in Multihop Wireless Networks", IEEE Trans. Vehicular Technology, vol. 60, no. 8, pp. 3947-3962, Oct. 2011.
  • G. Theodorakopoulos and J. S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks",IEEE J. Selected Areas in Comm. , vol. 24, no. 2, pp. 318-328, Feb. 2006.
  • P. Velloso, R. Laufer, D. Cunha, O. Duarte, and G. Pujolle, "Trust Management in Mobile Ad HocNetworks Using a Scal- able Maturity-Based Model", IEEE Trans. Network and Service Management, vol. 7, no. 3, pp. 172-185, Sept. 2010.
  • S. Lindsay, Y. Wei, H. Zhu, and K. Liu, "InformationTheoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks", IEEE J. Selected Areas inComm. , vol. 24, no. 2, pp. 305- 317, Feb. 2006.
  • M. Yu and K. Leung, "A Trustworthiness-Based QoS Routing Pro- tocol for Wireless Ad Hoc Networks", IEEE Trans. Wireless Comm. , vol. 8, no. 4, pp. 1888-1898, Apr. 2009.
  • Di Tang Tongtong Li Jian Ren and Jie Wu "Cost - Aware SEcure Routing (CASER) Protocol Design forWireless Sensor Networks",IEEE Transactions onParallel and Distributed Systems. , 2014
  • Mohmad M. E. A. Mahumad,Xiaodong Lin,Xue "Secure and Reliable routing protocol for HeterogeneousMultihop Wireless Network", IEEE transactions on parallel and distributed systems, vol. 26, no. 4, april 2015