Open Access   Article Go Back

Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey

Suresh Kumar1 , Kalpana Midha2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 934-937, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.934937

Online published on Jan 31, 2019

Copyright © Suresh Kumar, Kalpana Midha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Suresh Kumar, Kalpana Midha, “Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.934-937, 2019.

MLA Style Citation: Suresh Kumar, Kalpana Midha "Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey." International Journal of Computer Sciences and Engineering 7.1 (2019): 934-937.

APA Style Citation: Suresh Kumar, Kalpana Midha, (2019). Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey. International Journal of Computer Sciences and Engineering, 7(1), 934-937.

BibTex Style Citation:
@article{Kumar_2019,
author = {Suresh Kumar, Kalpana Midha},
title = {Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {934-937},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5186},
doi = {https://doi.org/10.26438/ijcse/v7i1.934937}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.934937}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5186
TI - Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Suresh Kumar, Kalpana Midha
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 934-937
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
124 195 downloads 185 downloads
  
  
           

Abstract

Prominence of wireless sensor networks (WSNs) is expanding ceaselessly in various spaces of day by day life, as they give productive strategy for gathering significant information from the surroundings for use in various applications. Steering in WSNs is the essential usefulness that permits the stream of data created by sensor hubs to the base station, while considering the extreme vitality imperative and the constraints of computational and capacity assets. In fact, this usefulness might be helpless and must be in itself anchored, since regular directing conventions in WSNs give productive steering strategies with low power utilization, yet they don`t consider the conceivable assaults. As sensor hubs might be effortlessly caught what`s more, traded off, we present a vitality effective secure information transmission in WSNs where we separate the region of enthusiasm for four quadrants and afterward utilizes the methods of both open and private key cryptography utilizing four Mobile Base stations for vitality sparing. We additionally utilize information pressure systems for diminishing the measure of bit transmission. We likewise utilize Monitor Hubs to recognize the inward assaults

Key-Words / Index Term

Cluster Based Wireless Sensor Network, Cryptographic Techniques, Data Compression technique, Mobile Sink nodes, Monitor Nodes

References

[1] Gay, D., Levis, P., and Culler, D. 2007. Software design patternsforTinyOS.PublishedinJournalACMTransactions onEmbeddedComputingSystems(TECS),Volume.6,2007.
[2] Dr. A. Senthilkumar, ?Energy Efficient Secure Multipath Routing Protocol For Wireless Sensor Networks ?, InternationalJournalofEngineeringResearch&Technology (IJERT)Vol. 2 Issue 4, April ?2013
[3] Nidal Nasser and Yunfeng Chen, Secure Multipath Routing Protocol for Wireless Sensor Networks, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW`07), 2007,IEEE
[4] THEODORE ZAHARIADIS, HELEN C. LELIGOU, STAMATIS VOLIOTIS,SOTIRIS MANIATIS, PANAGIOTISTRAKADAS,PANAGIOTISKARKAZIS,An EnergyandTrust-awareRoutingProtocolforLargeWirelessSensorNetworks,Proceedingsofthe9thWSEASInternational Conference on APPLIED INFORMATICS AND COMMUNICATIONS , (AIC`09).
[5] ShivaMurthyG,RobertJohnD?Souza,andGollaVaraprasad.: Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks, IEEE SENSORS JOURNAL, VOL. 12, NO. 10, (2012)
[6] A. Abduvaliyev, et al, ?On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks?, IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237,2013.
[7] Somia Sahraoui, Souheila Bouam , Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks,International Journal of CommunicationNetworks and Information Security (IJCNIS), Vol. 5, No. 3, December 2013.