ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 823-831

Keywords : Compromised Node (CN); Denial of service (DOS); Wireless Sensor Networks (WSN); Purely Random Propagation (PRP);

Source : Downloadexternal Find it from : Google Scholarexternal


Various possible security threats that may be experienced by a wireless sensor network (WSN).Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multipath routes. Under our design, the routes taken by the “shares” of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity.

Last modified: 2014-07-30 21:49:54