Node Attestation for Reliable Communication in WSN

Authors

  • Kaur R Department of Computer Science and Engineering, Desh Bhagat University, Punjab, India
  • Bansal K Department of Computer Science and Engineering, Desh Bhagat University, Punjab, India

Keywords:

Routing Strategy, Attestation Algorithm, Nodes

Abstract

A wireless sensor network is a group of specialized transducers with a communications infrastructure for monitoring and recording conditions at diverse locations. In this paper various approaches were described that were used for WSN. Leach is used in wireless sensor network and multi-hop leach protocol is used for energy consumed in a single hop for defining energy consumed in a single hop .By receiving various protocols the conclusion occur that leach is best protocol for WSN.

References

Xinyu Jin “Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN” IEEE Globecom Workshops, pp.2059 – 2064,2010.

Tamer AbuHmed “Software-Based Remote Code Attestation in Wireless Sensor Network” IEEE Global Telecommunications Conference, pp. 1 – 8, 2009.

Po-Hung Yang “Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents” IEEE ,pp. 82 – 89,2015.

Ahmad Salehi S. “Detection of Sinkhole Attack in Wireless Sensor Networks”, IEEE International Conference on Space Science and Communication, 2013, pp. 361-365.

A. Vijayalakshmi., “Mobile Agent Middleware Security for Wireless Sensor Networks” IEEE International Conference on Communication and Signal Processing, 2014, pp. 1669- 1673.

Van dana B. Salve, “AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks”, IEEE International Conference on Electrical, Computer and Communication Technologies, 2015, pp. 1 – 7.

Mohamed Guerroumi “Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink”IEEE International Conference on Information Technology, 2015, pp. 307- 313.

Sheela, D. “A non cryptographic method of sink hole attack detection in wireless sensor networks” IEEE International Conference on Information Technology, 2011, pp. 527 – 532.

Guerroumi, M., “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink” IEEE International Conference on Information Technology - New Generations, 2015, pp. 307 – 313.

Varshney, K.K. “Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network” IEEE International Conference on Information Communication and Embedded Systems, 2014, pp. 1 – 5.

Ritwik Banerjee “Energy efficient routing and bypassing energy-hole through mobile sink in WSN” IEEE Conf. on Computer Communication and Informatics (ICCCI), 2014, pp. 1 – 6.

Babar Nazir “Mobile Sink based Routing Protocol (MSRP) for Prolonging Network Lifetime in Clustered Wireless Sensor Network” IEEE Conf. on Computer Applications and Industrial Electronics (ICCAIE), 2010, pp. 624 – 629.

Pushpendu Karet “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes” IEEE Conf. on IEEE Transactions on Network and Service Management, 2016, pp. 99 – 112.

Mitra, S “Energy aware fault tolerant framework in Wireless Sensor Network” IEEE Conf. on Applications and Innovations in Mobile Computing (AIMoC),2014,pp- 139 – 145.

Deshpande, P. “Techniques improving throughput of wireless sensor network: A surveogies y” IEEE Conf. on Circuit, Power and Computing Technol (ICCPCT),2015,pp- 1 – 5.

Makhdoom, I. “A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks” IEEE Conf. on Software Engineering Conference (NSEC), 2014 ,pp- 1 – 6.

Krithiga, J “Efficient Code Guard mechanism against pollution attacks in interflow Network coding” IEEE Conf. on Communications and Signal Processing (ICCSP), 2014,pp- 1384 – 1388.

Geetha, R. “Fuzzy logic based compromised node detection and revocation in clustered wireless sensor networks” IEEE Conf. on Information Communication and Embedded Systems (ICICES),2014,pp- 1 – 6.

Yong-Sik Choi, “A study on sensor nodes attestation protocol in a WireleCACTss Sensor Network”, IEEE Conf. on Advanced Communication Technology (I), 2010, pp. 1738-9445.

Yuling Lei “The Research of Coverage Problems in Wireless Sensor Network”, IEEE Conf. on Wireless Networks and Information Systems, 2009, pp 31 – 34.

Downloads

Published

2025-11-11

How to Cite

[1]
R. Kaur and K. Bansal, “Node Attestation for Reliable Communication in WSN”, Int. J. Comp. Sci. Eng., vol. 4, no. 6, pp. 16–20, Nov. 2025.

Issue

Section

Research Article