A SURVEY OF SECURED APPROACH TO ROUTING IN WIRELESS SENSOR NETWORKS USING THRESHOLD CRYPTOGRAPHY
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 7)Publication Date: 2017-07-30
Authors : Shraddha Saxena; Rohit Kumar Rathor;
Page : 606-610
Keywords : Wireless Sensor Networks; Mobile Ad Hoc Networks; Key Management; Threshold Cryptography; Clustered Routing.;
Abstract
In this paper, characteristics of Wireless Sensor Networks (WSN), along with problems and security issues usually faced in routing Wireless sensor networks due to highly dynamic nature and lack of centralized management and infrastructure has been tried to explore. The main objective of this paper is to put an effort to improve security in routing protocols, especially Clustered routing Protocol using concepts of Threshold Cryptography of distributed key management and certification. Since providing security support for ad hoc wireless networks is challenging for a number of reasons such as susceptibility to security attacks ranging from passive eavesdropping to active interfering and denial-of-service (DoS) attacking. Wireless sensor networks are prone to occasional break-ins in a large-scale mobile network are inevitable over a large time interval. Such networks provide no infrastructure support. Adequate security support for authentication, confidentiality, integrity, non-repudiation, access control and availability is critical to deploying this wireless networking technology in commercial environments. Today, networks security, whatever they are wireless or not, is an important component in the network management. The works done and studied so far are limited either up to one hop networks or for application layer services only. This work thus has been proposed to implement threshold cryptography over Clustered Based Routing Protocol and to study its behavior of packet flow on the basis of Throughput, packet delivery ratio, Normalized Routing overhead and End to end delay in different scenario and compared with the scenario without implementing the security.
Other Latest Articles
- A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES
- REVIEW PAPER ON PSEUDO-DIFFERENTIAL AND BULK-DRIVEN MOS TRANSISTOR TECHNIQUE FOR OTA
- THEORETICAL ESTIMATION OF STRUCTURES: DIFFERENTIALLY ROTATING STELLAR MODELS OF NON-UNIFORM MASSES
- PERFORMANCE OF CO-AXIAL PROBE FED RECTANGULAR MICROSTRIP ANTENNA WITH RADOME THICKNESS AND DILECTRIC CONSTANTS
- EXTRACTION OF MATERIALS FROM E-WASTE
Last modified: 2017-07-19 20:58:15