A Survey on Data Protection Schemes on Multipath WSN

Authors

  • Priyanka R Information Science and Engineering, Visvesvaraya Technological University, India

Keywords:

Wireless communication, Sensor networks, Network level security

Abstract

WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. The deployment of such a network is accompanied by several security issues such as data confidentiality. Many encryption algorithms addressed to network communication exist, but they do not always match the low resources restrictions like low processor, memory, and limited energy which are set upon the sensors. To overcome this we propose solution such as the Securing Data based on Multi-Path routing method, or an application of the Shamir's Secret Sharing Scheme, both the techniques use distinct paths in the network to send pieces of data obtained by splitting the original message. This paper addresses the two methods named above, and proposes a solution based on traffic classification, using alternatively the Securing Data based on Multi-Path routing method, the Shamir's Secret Sharing Scheme, and strong encryption algorithms.

References

S. Alouneh, A. Agarwal, and A. En-Nouaary, "A novel path protection scheme for MPLS networks using multi-path routing," Computer Networks, vol. 53, no. 9, pp. 1530-1545, Jun. 2009.

Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol-01, Issue-04, pp (8-11), Sep -Oct 2013.

Y. Mao, "A feedback-based multipath approach for secure data collection in wireless sensor networks," Ubiquitous Computing and Communication Journal, vol. 5, no. 2, pp. 27-32, Jun. 2010.

Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014,

M. A. Simplicio, Jr, B. T. de Oliveira, P. S. L. M. Barreto, C. B. Margi, T. C. M. B. Carvalho, and M. Naslund, "Comparison of authenticatedencryption schemes in wireless sensor networks," in Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, Oct. 2011, pp. 454-461.

P. Ballarini, L. Mokdad, and Q. Monnet, "Modeling tools for detecting DoS attacks in WSNs," Security and Communication Networks, 2013, not published yet.

Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011

Madhavi S. Kukade and Kapil N. Hande, "Analysis of Uniform Distribution of Storage Nodes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-02, Issue-01, Page No (43-47), Jan -2014

J. Ben-Othman and L. Mokdad, "Enhancing data security in ad hoc networks on based multipath routing," Journal of Parallel and Distributed Computing, vol. 70, no. 3, pp. 309-316, Mar. 2010.

S.G. Santhi and R.Nathiya, "Power Consumption Based Efficient Routing With Mobile Collector in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (64-70), Apr -2014

Downloads

Published

2025-11-11

How to Cite

[1]
R. Priyanka, “A Survey on Data Protection Schemes on Multipath WSN”, Int. J. Comp. Sci. Eng., vol. 4, no. 3, pp. 120–125, Nov. 2025.