SECURE DATA COLLECTION IN WSN BY RANDOMIZED DISPERSIVE ROUTING
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)Publication Date: 2014-07-30
Authors : Anil Kumar; Jyoti;
Page : 823-831
Keywords : Compromised Node (CN); Denial of service (DOS); Wireless Sensor Networks (WSN); Purely Random Propagation (PRP);
Abstract
Various possible security threats that may be experienced by a wireless sensor network (WSN).Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multipath routes. Under our design, the routes taken by the “shares” of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity.
Other Latest Articles
- LANGUAGE EDUCATIONAL FACTOR OF THE DETERMINING OF CONSTRUCTIVE AND DESTRUCTIVE POLITICS IN MODERN UKRAINE
- PSYCHOLOGICAL PECULIARITIES OF MANAGEMENT CONTROL IN THE SYSTEM OF ADMINISTRATIVE RELATIONS
- EMOTIONAL BURNOUT SYNDROME OF MEDICAL WORKERS OF TUBERCULOUS AND ONCOLOGICAL MEDICAL INSTITUTIONS IN THE CONTEXT OF PRIMORSK TERRITORY
- DEVELOPMENT OF STUDENTS’ COGNITIVE ABILITIES IN THE SYSTEM OF ?SCHOOL ? TECHNICAL INSTITUTION OF HIGHER EDUCATION? IN THE PROCESS OF FOREIGN LANGUAGE TEACHING
- DEVELOPMENT OF LIFE SECURITY SECTION WITH A HELP OF NOKSOLOGICAL MODEL
Last modified: 2014-07-30 21:49:54