International Journal of Emerging Technology and Advanced Engineering (IJETAE)
The security susceptibilities of the three well acknowledged Topology Maintenance Protocols PEAS, ASCENT, and CCP (TMPs) are analyzed for sensor networks. By sustaining the Subset of nodes in a dynamic or awake state, these three protocols upturn the lifespan of the sensor network. The strategy of these protocols instigates that the sensor nodes will be installed in a trustworthy, non-adversarial atmosphere, and does not take into account the influence of outbreaks launched by malevolent insider or outcast nodes. A Meta-protocol (Meta-TMP) is being projected to exemplify the class of topology maintenance protocol.