Survey of Different Security and Routing Protocols Hierarchy in Wireless Network Communication
S. Nagendram1, K. Ramchand H Rao2
1S. Nagendram, Research Scholar, Assistant Professor, Department of Computer Science and Engineering, KLEF ANU, Guntur (A.P), India.
2Dr. K. Ramchand H Rao, Professor, Department of Computer Science and Engineering, ASN College of Engineering and Technology, Tenali, Guntur (A.P), India.
Manuscript received on 13 December 2018 | Revised Manuscript received on 22 December 2018 | Manuscript Published on 30 December 2018 | PP: 465-473 | Volume-8 Issue-2S, December 2018 | Retrieval Number: 100.1/ijeat.B10971282S18/18©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: In recent years, wireless networking is an emerging concept for personal, mobiles and sensor communications. Normally wireless network is combined and integrated data relations for modern communication in infrastructure, energy efficiency; these are the main design parameters to improve network performance with respect to mitigate communication relations. Security is one of the parameter to define network efficiency for real time wireless networks. In this paper, we discuss about traditional approaches for wireless communication to facilitate data encryption and decryption. In this paper, we describe different type’s security issues with respect to attack sequences in network communication. We also give brief description about different routing protocols to support data communication in wireless networks. And also define different routing algorithms used in data communication to increase network efficiency with respect to different network parameters. Finally, describe a comparative study between different security, routing and protocols used in wireless communication.
Keywords: Wireless Communication, Routing Algorithms, Routing Protocol Hierarchy, Security And Privacy.
Scope of the Article: Wireless Communications