Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 55 - Number 7
Year of Publication: 2012
Rayala Upendar Rao

Rayala Upendar Rao. Article: Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys. International Journal of Computer Applications 55(7):48-52, October 2012. Full text available. BibTeX

	author = {Rayala Upendar Rao},
	title = {Article: Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {55},
	number = {7},
	pages = {48-52},
	month = {October},
	note = {Full text available}


Wireless sensor network is an emerging technology, uses in many applications like boarder area enemy tracking system, fire alarm system, etc. Sensors are low power devices which possess huge attacks. These low power devices are not suitable for complex cryptographic algorithms. In this paper we implemented symmetric key algorithm with session keys. This concept carry better security compared previous secure routing algorithm in cluster wireless sensor networks. Here the forwarding node will check the both secrete global key and session key. It also checks one more parameter that is loading time of node, ensures more security.


  • Hemanta Kumar Kalita and Avijit Kar, "Wireless Sensor Network Security Analysis", International Journal of Next-Generation Networks (IJNGN),Vol. 1, No. 1, December 2009.
  • Chris Karlof David Wagner, " Secure Routing in Wireless Sensor Network: Attacks and CounterMeasures", Ad Hoc Networks 1 (2003) 293–315.
  • Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan," Energy-Efficient Communication Protocol for Wireless Microsensor Networks", Proceedings of the 33rd Hawaii International Conference on System Sciences – 2000.
  • Seema Bandyopadhyay and Edward J. Coyle, " An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Netwroks", IEEE INFOCOM 2003 Twentysecond Annual Joint Conference of the IEEE Computer and Communications Societies IEEE Cat No03CH37428 (2003), 1713-1723.
  • Taejoon Park and Kang G. Shin, "Secure Routing Based on Distributed Key Sharing in Large-Scale Sensor Networks", ACM Transactions on Embedded Computing Systems, Vol. 7, No. 2, Article 20, Publication date: February 2008.
  • Peng Ning, An Liu,and Wenliang Du, "Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks", ACM Journal Name, Vol. , No. , 20, Pages 1–31.
  • Yun Zhou, Yanchao Zhang, Yuguang Fang, "Access control in wireless sensor networks," Ad Hoc Networks 5 (2007) 3–13.
  • WANG Xiao-yun , YANG Li-zhen, "SLEACH Secure Low. Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks", WUJNS Wuhan University Journal of Natural Sciences Vol. 10 No. 1 2005 127-131.
  • Mandicou Ba, Ibrahima Niang, Bamba Gueye, "A Deterministic Key Management Scheme for "Securing Cluster-Based Sensors Networks", 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, ISBN: 978-0-7695-4322-2.
  • Chris Karlof and David Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and countermeasures," Ad Hoc Networks 1 (2003) 293–315.
  • Pooja Kumari, Mukesh Kumar, Rahul Rishi, "Study of Security in Wireless Sensor Networks", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (5) 2010, 347-354.