CFP last date
20 May 2024
Reseach Article

Secured Directed Diffusion using Mobile Agents

by Waseem Ahmed, Preeti Sethi, Naresh Chauhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 21
Year of Publication: 2013
Authors: Waseem Ahmed, Preeti Sethi, Naresh Chauhan
10.5120/13020-0184

Waseem Ahmed, Preeti Sethi, Naresh Chauhan . Secured Directed Diffusion using Mobile Agents. International Journal of Computer Applications. 73, 21 ( July 2013), 32-36. DOI=10.5120/13020-0184

@article{ 10.5120/13020-0184,
author = { Waseem Ahmed, Preeti Sethi, Naresh Chauhan },
title = { Secured Directed Diffusion using Mobile Agents },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 21 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number21/13020-0184/ },
doi = { 10.5120/13020-0184 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:45.613173+05:30
%A Waseem Ahmed
%A Preeti Sethi
%A Naresh Chauhan
%T Secured Directed Diffusion using Mobile Agents
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 21
%P 32-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks comprise of innumerable small sensors that have limited resources. As wireless sensor networks are usually deployed in remote and unfriendly environment to transmit sensitive and crucial information, sensor nodes are vulnerable to node compromise attacks. Security issues such as data confidentiality and integrity which are of utmost importance need proper consideration in WSN. Hence, wireless sensor network protocols, as data aggregation protocol, must be designed keeping secrecy in mind. The work aims to use software agents to introduce security features in an agent based environment which is known as Secured Directed Diffusion using Mobile Agents (SDDMA). It extends the IDDMA approach by adding encryption to it. This will help to determine the sequence of target nodes to be visited by the Mobile Agent along with the encrypted data.

References
  1. Fei Jiang, Haoshan Shi, Zhiyan Xu, Xiangjun Dong "Improved Directed Diffusion-Based Mobile Agent Mechanism for Wireless Sensor Networks" IEEE, Aug. 2009.
  2. Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva "Directed Diffusion forWireless Sensor Networking" Defense Advanced Research Projects Agency under grant DABT63-99-1-0011.
  3. Kemal Akkaya *, Mohamed Younis "A survey on routing protocols for wireless sensor networks" Elsevier B. V. , 2003
  4. Hongjoong Sin, Jangsoo Lee, Sungju Lee, Seunghwan Yoo, Sanghyuck Lee, Jaesik Lee, Yongjun Lee, and Sungchun Kim"Agent-based Framework for Energy Efficiency in Wireless Sensor Networks" World Academy of Science, Engineering and Technology 46, 2008
  5. Nick Jennings,Michael Wooldridge" Software Agents" IEE Review, pp 17-20, January 1996.
  6. Yashpal Singh1 ,Kamal Deep2 and S Niranjan3 "Multiple Criteria Clustering of Mobile Agents in WSN" International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 3,
  7. Wang Jietai, Xu Jiadong, Yang Shaojun "Research on Mechanism of Mobile Agent for Wireless Sensor Networks" IEEE, 2007.
  8. Suat Ozdemir,, Yang Xiao "Secure data aggregation in wireless sensor networks: A comprehensive overview" Elsevier B. V. , 2009.
  9. Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong "Security in Wireless Sensor Networks: Issues and Challenges", ICACT, pp. 20-22, Feb. 2006.
  10. Mitsuru Oshima,Guenter Karjoth "Aglets Specification (1. 0)" IBM May 20th, 1997
  11. S. John, "Wireless Sensor Networks," Department Of Computer Science, University Of Virginia , June 19, 2006.
  12. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "A survey on sensor networks" IEEE Commun. Mag. Vol. 40 no. 8, pp. 102–114, 2002.
  13. K. Akkaya, M. Demirbas, R. S. Aygun, "The Impact of Data Aggregation on the Performance of Wireless Sensor Networks" Wiley Wireless Commun. Mobile Comput. (WCMC) J. 8, pp. 171–193, 2008.
  14. R. Rajagopalan, P. K. Varshney, "Data aggregation techniques in sensor networks: a survey" IEEE Commun. Surveys Tutorials, vol. 8, no. 4, 2006.
  15. B. Krishnamachari, D. Estrin, S. Wicker, "The impact of data aggregation in wireless sensor networks" Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, pp. 575–578, 2002.
  16. J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEEWireless Communications, vol. 11, no. 6, pp. 6–28, 2004.
  17. L. Szumel, J. LeBrun, J. D. Owens, "Towards a Mobile Agent Framework for Sensor Networks," Proc. 2nd IEEE Workshop on Embedded Networked Sensors, Sydney, Australia, pp . 79–88, 2005.
  18. D. Culler, D. Estrin, M. Srivastava, "Overview of sensor networks," IEEE Computer, vol. 37, no. 8, August 2004.
  19. V. Kunchakarra, "simulation study of routing protocols in wireless sensor networks," Department of Computer Science, Osmania University, Dec. 2005.
  20. S. Misra et al. (eds. ) "Guide to Wireless Sensor Networks Computer Communications and Networks" DOI: 10. 1007/978-1-84882-218-4 4, Springer-Verlag London Limited, 2009.
  21. Chandrakasan, A. , Rabiner Heinzelman, W. , Balakrishnan, H. : "Energy efficient communication protocols for wireless microsensor networks". 33rd Hawaii Int. Conf. on Systems Sciences, vol. 2, pp. 3005–3014, January 2000.
  22. Boulis, A. et al. "Aggregation in sensor networks: An energy - accuracy tradeoff. " IEEE workshop on Sensor Network Protocols and Applications, 2003.
  23. Akyildiz, I. et al. " Wireless sensor networks: a survey". Elsevier Computer Networks, 38, 2002
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Agent Directed Diffusion Wireless Sensor Networks Secure Data Aggregation Cryptography