Efficient Data Collection Using Randomized Multipath Routes in WSN

Authors

  • M. Trinath Basu Vardhaman College Of Engineering, Hyderabad, Andhrapradesh, India
  • G Venkatesh Vardhaman College Of Engineering, Hyderabad, Andhrapradesh, India
  • Immidi Srikanth Vardhaman College Of Engineering, Hyderabad, Andhrapradesh, India

Keywords:

Wireless Sensor Network (WSN), Denial Of Service (DOS) Attack, Multi-Path Routing

Abstract

Wireless Sensor Networks (WSNs) are vulnerable to attacks such as Denial of Service (DoS) and compromised-node. This is due to the nature of the existing multi-path routing mechanisms which are deterministic in nature. Adversaries can steal information by compromising routing algorithm in WSN. In this paper we propose routing mechanisms where randomized multi-path routes are dynamically computed. Such routes can bypass the black holes made though DoS and compromised node attacks .The generated routes are energy efficient besides dispersive in nature. Simulation results reveal that the proposed mechanisms are energy efficient in bypassing black holes.

References

A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer Magazine, 35(10):54–62, Oct. 2002.

W. Lou, W. Liu, and Y. Fang. Spread: enhancing data confidentiality in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM Conference, volume 4, pages 2404–2413, Mar. 2004.

W. Lou and Y. Kwon. H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology, 55(4):1320–1330, July 2006.

P. C. Lee, V. Misra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transactions on Networking, 15(6):1490–1501, Dec. 2007.

Z. Ye, V. Krishnamurthy, and S. K. Tripathi. A framework for reliable routing in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM Conference, volume 1, pages 270–280, Mar. 2003.

B. Vaidya, J. Y. Pyun, J. A. Park, and S. J. Han. Secure multipath routing scheme for mobile ad hoc network. In Proceedings of IEEE International

Symposium on Dependable, Autonomic and Secure Computing, pages 163–171, 2007.

M. Burmester and T. V. Le. Secure multipath communication in mobile ad hoc networks. In Proceedings of the International Conference on Information Technology: Coding and Computing, pages 405–409, 2004.

R. Mavropodi, P. Kotzanikolaou, and C. Douligeris. Secmr- a secure multipath routing protocol for ad hoc networks. Elsevier Journal of Ad Hoc Networks, 5(1):87–99, Jan. 2007.

P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.

X. Y. Li, K. Moaveninejad, and O. Frieder. Regional gossip routing wireless ad hoc networks. ACM Journal of Mobile Networks and Applications, 10(1-2):61–77, Feb. 2005.

C. L. Barrett, S. J. Eidenbenz, L. Kroc, M. Marathe, and J. P. Smith. Parametric probabilistic sensor network routing. In Proceedings of the ACM International Conference on Wireless Sensor Networks and Applications (WSNA), pages 122–131, 2003.

Tao Shu, Sisi Liu, and Marwan Krunz. Secure Data Collection in Wireless Sensor NetworksUsing Randomized Dispersive Routes. IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2009 proceedings.

Downloads

Published

2014-05-31

How to Cite

[1]
M. T. Basu, G. Venkatesh, and I. Srikanth, “Efficient Data Collection Using Randomized Multipath Routes in WSN”, Int. J. Comp. Sci. Eng., vol. 2, no. 5, pp. 103–106, May 2014.

Issue

Section

Research Article