ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A SURVEY OF SECURED APPROACH TO ROUTING IN WIRELESS SENSOR NETWORKS USING THRESHOLD CRYPTOGRAPHY

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 7)

Publication Date:

Authors : ; ;

Page : 606-610

Keywords : Wireless Sensor Networks; Mobile Ad Hoc Networks; Key Management; Threshold Cryptography; Clustered Routing.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper, characteristics of Wireless Sensor Networks (WSN), along with problems and security issues usually faced in routing Wireless sensor networks due to highly dynamic nature and lack of centralized management and infrastructure has been tried to explore. The main objective of this paper is to put an effort to improve security in routing protocols, especially Clustered routing Protocol using concepts of Threshold Cryptography of distributed key management and certification. Since providing security support for ad hoc wireless networks is challenging for a number of reasons such as susceptibility to security attacks ranging from passive eavesdropping to active interfering and denial-of-service (DoS) attacking. Wireless sensor networks are prone to occasional break-ins in a large-scale mobile network are inevitable over a large time interval. Such networks provide no infrastructure support. Adequate security support for authentication, confidentiality, integrity, non-repudiation, access control and availability is critical to deploying this wireless networking technology in commercial environments. Today, networks security, whatever they are wireless or not, is an important component in the network management. The works done and studied so far are limited either up to one hop networks or for application layer services only. This work thus has been proposed to implement threshold cryptography over Clustered Based Routing Protocol and to study its behavior of packet flow on the basis of Throughput, packet delivery ratio, Normalized Routing overhead and End to end delay in different scenario and compared with the scenario without implementing the security.

Last modified: 2017-07-19 20:58:15