Open Access   Article Go Back

A Survey on Data Protection Schemes on Multipath WSN

Priyanka R1

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 120-125, May-2016

Online published on Jun 07, 2016

Copyright © Priyanka R . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Priyanka R, “A Survey on Data Protection Schemes on Multipath WSN,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.120-125, 2016.

MLA Style Citation: Priyanka R "A Survey on Data Protection Schemes on Multipath WSN." International Journal of Computer Sciences and Engineering 04.03 (2016): 120-125.

APA Style Citation: Priyanka R, (2016). A Survey on Data Protection Schemes on Multipath WSN. International Journal of Computer Sciences and Engineering, 04(03), 120-125.

BibTex Style Citation:
@article{R_2016,
author = {Priyanka R},
title = {A Survey on Data Protection Schemes on Multipath WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {120-125},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=77},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=77
TI - A Survey on Data Protection Schemes on Multipath WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Priyanka R
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 120-125
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. The deployment of such a network is accompanied by several security issues such as data confidentiality. Many encryption algorithms addressed to network communication exist, but they do not always match the low resources restrictions like low processor, memory, and limited energy which are set upon the sensors. To overcome this we propose solution such as the Securing Data based on Multi-Path routing method, or an application of the Shamir's Secret Sharing Scheme, both the techniques use distinct paths in the network to send pieces of data obtained by splitting the original message. This paper addresses the two methods named above, and proposes a solution based on traffic classification, using alternatively the Securing Data based on Multi-Path routing method, the Shamir's Secret Sharing Scheme, and strong encryption algorithms.

Key-Words / Index Term

Wireless communication, Sensor networks,Network level security

References

[1] S. Alouneh, A. Agarwal, and A. En-Nouaary, "A novel path protection scheme for MPLS networks using multi-path routing," Computer Networks, vol. 53, no. 9, pp. 1530-1545, Jun. 2009.
[2] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol-01, Issue-04, pp (8-11), Sep -Oct 2013.
[3] Y. Mao, "A feedback-based multipath approach for secure data collection in wireless sensor networks," Ubiquitous Computing and Communication Journal, vol. 5, no. 2, pp. 27-32, Jun. 2010.
[4] Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014,
[5] M. A. Simplicio, Jr, B. T. de Oliveira, P. S. L. M. Barreto, C. B. Margi, T. C. M. B. Carvalho, and M. Naslund, "Comparison of authenticatedencryption schemes in wireless sensor networks," in Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, Oct. 2011, pp. 454-461.
[6] P. Ballarini, L. Mokdad, and Q. Monnet, "Modeling tools for detecting DoS attacks in WSNs," Security and Communication Networks, 2013, not published yet.
[7] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[8] Madhavi S. Kukade and Kapil N. Hande, "Analysis of Uniform Distribution of Storage Nodes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-02, Issue-01, Page No (43-47), Jan -2014
[9] J. Ben-Othman and L. Mokdad, "Enhancing data security in ad hoc networks on based multipath routing," Journal of Parallel and Distributed Computing, vol. 70, no. 3, pp. 309-316, Mar. 2010.
[10] S.G. Santhi and R.Nathiya, "Power Consumption Based Efficient Routing With Mobile Collector in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (64-70), Apr -2014