Open Access   Article Go Back

Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks

Priyanka .B1 , Mahesh .A2

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 110-113, May-2016

Online published on Jun 07, 2016

Copyright © Priyanka .B, Mahesh .A . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Priyanka .B, Mahesh .A, “Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.110-113, 2016.

MLA Style Citation: Priyanka .B, Mahesh .A "Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 04.03 (2016): 110-113.

APA Style Citation: Priyanka .B, Mahesh .A, (2016). Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 04(03), 110-113.

BibTex Style Citation:
@article{.B_2016,
author = {Priyanka .B, Mahesh .A},
title = {Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {110-113},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=75},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=75
TI - Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Priyanka .B, Mahesh .A
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 110-113
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

In wireless sensor networks various security threats are encountered, so various security providing algorithms are available. Compromised node and denial of service are the two key attacks in wireless sensor networks. Here, we study routing mechanisms that circumvent black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes know to the source, and hence endanger all information sent over these routes. We develop mechanism that generate randomized multipath routes. Under our design, the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy efficient, making them quite capable of bypassing black holes at low energy cost. Here we propose four algorithms those are purely random propagation, non-repetitive random propagation, direct random propagation and optimized random propagation and we compare the four different algorithm to study the performance. Graphical results are used to verify the effectiveness of our design.

Key-Words / Index Term

Wireless sensor networks, Security, Attacks, Routing

References

[1] S.G. Santhi and R.Nathiya, "Power Consumption Based Efficient Routing With Mobile Collector in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-2(4), Page No (64-70), Apr -2014
[2] W. Lou, W. Liu. Fang, “SPREAD: Enhancing data confidentiality in mobile ad-hoc networks, IEEE INFOCOM 2004, Hong Kong, China, March 2004.
[3] W. Lou and Y. Kwon. H-Spread: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transaction on Vehicular Technology, 55(4):1320-1330, July 2006.
[4] P.C. Lee, V. Mishra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transaction on Networking, 15(6):1490-1501, Dec. 2007.
[5] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011