Open Access   Article Go Back

Efficient Data Collection Using Randomized Multipath Routes in WSN

M.T. Basu1 , G. Venkatesh2 , K. Immidisri3

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 203-206, May-2014

Online published on May 31, 2014

Copyright © M.T. Basu, G. Venkatesh, K. Immidisri . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M.T. Basu, G. Venkatesh, K. Immidisri , “Efficient Data Collection Using Randomized Multipath Routes in WSN,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.203-206, 2014.

MLA Style Citation: M.T. Basu, G. Venkatesh, K. Immidisri "Efficient Data Collection Using Randomized Multipath Routes in WSN." International Journal of Computer Sciences and Engineering 2.5 (2014): 203-206.

APA Style Citation: M.T. Basu, G. Venkatesh, K. Immidisri , (2014). Efficient Data Collection Using Randomized Multipath Routes in WSN. International Journal of Computer Sciences and Engineering, 2(5), 203-206.

BibTex Style Citation:
@article{Basu_2014,
author = {M.T. Basu, G. Venkatesh, K. Immidisri },
title = {Efficient Data Collection Using Randomized Multipath Routes in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {203-206},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=167},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=167
TI - Efficient Data Collection Using Randomized Multipath Routes in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - M.T. Basu, G. Venkatesh, K. Immidisri
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 203-206
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3651 3457 downloads 3588 downloads
  
  
           

Abstract

Wireless Sensor Networks (WSNs) are vulnerable to attacks such as Denial of Service (DoS) and compromised-node. This is due to the nature of the existing multi-path routing mechanisms which are deterministic in nature. Adversaries can steal information by compromising routing algorithm in WSN. In this paper we propose routing mechanisms where randomized multi-path routes are dynamically computed. Such routes can bypass the black holes made though DoS and compromised node attacks .The generated routes are energy efficient besides dispersive in nature. Simulation results reveal that the proposed mechanisms are energy efficient in bypassing black holes.

Key-Words / Index Term

Wireless Sensor Network (WSN), Denial Of Service (DOS) Attack, Multi-Path Routing

References

[1] A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer Magazine, 35(10):54�62, Oct. 2002.
[2] W. Lou, W. Liu, and Y. Fang. Spread: enhancing data confidentiality in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM Conference, volume 4, pages 2404�2413, Mar. 2004.
[3] W. Lou and Y. Kwon. H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology, 55(4):1320�1330, July 2006.
[4] P. C. Lee, V. Misra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transactions on Networking, 15(6):1490�1501, Dec. 2007.
[5] Z. Ye, V. Krishnamurthy, and S. K. Tripathi. A framework for reliable routing in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM Conference, volume 1, pages 270�280, Mar. 2003.
[6] B. Vaidya, J. Y. Pyun, J. A. Park, and S. J. Han. Secure multipath routing scheme for mobile ad hoc network. In Proceedings of IEEE International
Symposium on Dependable, Autonomic and Secure Computing, pages 163�171, 2007.
[7] M. Burmester and T. V. Le. Secure multipath communication in mobile ad hoc networks. In Proceedings of the International Conference on Information Technology: Coding and Computing, pages 405�409, 2004.
[8] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris. Secmr- a secure multipath routing protocol for ad hoc networks. Elsevier Journal of Ad Hoc Networks, 5(1):87�99, Jan. 2007.
[9] P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.
[10] X. Y. Li, K. Moaveninejad, and O. Frieder. Regional gossip routing wireless ad hoc networks. ACM Journal of Mobile Networks and Applications, 10(1-2):61�77, Feb. 2005.
[11] C. L. Barrett, S. J. Eidenbenz, L. Kroc, M. Marathe, and J. P. Smith. Parametric probabilistic sensor network routing. In Proceedings of the ACM International Conference on Wireless Sensor Networks and Applications (WSNA), pages 122�131, 2003.
[12] Tao Shu, Sisi Liu, and Marwan Krunz. Secure Data Collection in Wireless Sensor NetworksUsing Randomized Dispersive Routes. IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2009 proceedings.