CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure Packet Transmission in Wireless Sensor Networks using Dynamic Routing Techniques

by G. Ravi, M. Mohamed Surputheen, R. Srinivasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 22
Year of Publication: 2012
Authors: G. Ravi, M. Mohamed Surputheen, R. Srinivasan
10.5120/7901-1165

G. Ravi, M. Mohamed Surputheen, R. Srinivasan . Secure Packet Transmission in Wireless Sensor Networks using Dynamic Routing Techniques. International Journal of Computer Applications. 49, 22 ( July 2012), 8-11. DOI=10.5120/7901-1165

@article{ 10.5120/7901-1165,
author = { G. Ravi, M. Mohamed Surputheen, R. Srinivasan },
title = { Secure Packet Transmission in Wireless Sensor Networks using Dynamic Routing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 22 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number22/7901-1165/ },
doi = { 10.5120/7901-1165 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:53.938285+05:30
%A G. Ravi
%A M. Mohamed Surputheen
%A R. Srinivasan
%T Secure Packet Transmission in Wireless Sensor Networks using Dynamic Routing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 22
%P 8-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the unmanned nature of Wireless Sensor Networks, security becomes a key criterion when it comes to networks dealing with confidential data. Compromised node, Denial of Service (DoS) [1] attacks and Black-Holes/Sink-Holes [2] are the three key types of attacks in Sensor Networks. Classic routing algorithms use deterministic multipath routing schemes, where a predefined path exits between any two nodes. Once if the adversary acquires the routing algorithm it is possible to compute the route, making all information sent over these routes vulnerable to its attacks. Our approach involves selecting intermediary nodes for each packet rather than sending the packets directly to the destination node. This way, the user initially disperses all the packets that are to be transmitted using a modified form of Backpressure algorithm [4] and then directs them to the destination node using SENCAST [5]. By following this method, most of the packets that are sent through a network have the probability of escaping black holes. Simulations show that our approach is much more effective in terms of security when compared to their deterministic counterparts.

References
  1. Dirk Westhoff, Joao Girao, and Mithun Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation", IEEE Transactions on Mobile Computing, October 2006, Vol. 5, No. 10.
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Comm. Magazine, August 2002, Vol. 40, No. 8, PP. 102-114.
  3. Blilat Asmae, El Houda Chaoui Nour, Ghazi Mohammed El , Bouayad Anas, "Wireless sensor network: Security challenges", Network Security and Systems (JNS2)", April 2012, PP. 68-72.
  4. Michael J. Neely, Rahul Urgaonkar, "Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity, AD HOC NETWORKS (ELSEVIER)", July 2009, Vol. 7, No. 5, PP. 862-881.
  5. P. Appavoo and K. Khedo, "SENCAST: A Scalable Protocol for Unicasting and Multicasting in a Large Ad hoc Emergency Network", IJCSNS International Journal of Computer Science and Network Security, February 2008, Vol. 8, No. 2.
  6. D. R. Stinson, "Cryptography, Theory and Practice", CRC Press, 2006.
  7. G. Ravi, M. Mohamed Surputheen, Dr. R. Srinivasan, "Fast Energy-Efficient Secure Dynamic Address Routing For Scalable WSNs", IJCSI International Journal of Computer Science Issues, March 2012, Vol. 9, Issue 2, No. 1.
  8. Eduardo F. Nakamura, Antonio A. F. Loureiro and Alejandro C. Frery, "Information Fusion for Wireless Sensor Networks: Methods, Models, and Classifications".
  9. Tao Shu, Marwan Krunz, and Sisi Liu, "Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes", IEEE transactions on mobile computing, July 2010, Vol. 9, No. 7.
  10. A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," Computer, October 2002, Vol. 35, No. 10, PP. 54-62.
  11. Harminder S. Bindra, Sunil K. Maakar and A. L. Sangal, "Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model", IJCSI International Journal of Computer Science Issues, May 2010, Vol. 7, Issue 3, No 10.
  12. Scott Moeller, Avinash Sridharan, Bhaskar Krishnamachari, Omprakash Gnawali, "Backpressure Routing Made Practical".
  13. Modares H, Salleh R, Moravejosharieh A, "Overview of Security Issues in Wireless Sensor Networks", Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), Sept 2011, PP. 308-311.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Randomized Routing Secret Sharing Dispersive Routes