Efficient Data Collection Using Randomized Multipath Routes in WSN
Keywords:
Wireless Sensor Network (WSN), Denial Of Service (DOS) Attack, Multi-Path RoutingAbstract
Wireless Sensor Networks (WSNs) are vulnerable to attacks such as Denial of Service (DoS) and compromised-node. This is due to the nature of the existing multi-path routing mechanisms which are deterministic in nature. Adversaries can steal information by compromising routing algorithm in WSN. In this paper we propose routing mechanisms where randomized multi-path routes are dynamically computed. Such routes can bypass the black holes made though DoS and compromised node attacks .The generated routes are energy efficient besides dispersive in nature. Simulation results reveal that the proposed mechanisms are energy efficient in bypassing black holes.
References
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer Magazine, 35(10):54–62, Oct. 2002.
W. Lou, W. Liu, and Y. Fang. Spread: enhancing data confidentiality in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM Conference, volume 4, pages 2404–2413, Mar. 2004.
W. Lou and Y. Kwon. H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology, 55(4):1320–1330, July 2006.
P. C. Lee, V. Misra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transactions on Networking, 15(6):1490–1501, Dec. 2007.
Z. Ye, V. Krishnamurthy, and S. K. Tripathi. A framework for reliable routing in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM Conference, volume 1, pages 270–280, Mar. 2003.
B. Vaidya, J. Y. Pyun, J. A. Park, and S. J. Han. Secure multipath routing scheme for mobile ad hoc network. In Proceedings of IEEE International
Symposium on Dependable, Autonomic and Secure Computing, pages 163–171, 2007.
M. Burmester and T. V. Le. Secure multipath communication in mobile ad hoc networks. In Proceedings of the International Conference on Information Technology: Coding and Computing, pages 405–409, 2004.
R. Mavropodi, P. Kotzanikolaou, and C. Douligeris. Secmr- a secure multipath routing protocol for ad hoc networks. Elsevier Journal of Ad Hoc Networks, 5(1):87–99, Jan. 2007.
P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.
X. Y. Li, K. Moaveninejad, and O. Frieder. Regional gossip routing wireless ad hoc networks. ACM Journal of Mobile Networks and Applications, 10(1-2):61–77, Feb. 2005.
C. L. Barrett, S. J. Eidenbenz, L. Kroc, M. Marathe, and J. P. Smith. Parametric probabilistic sensor network routing. In Proceedings of the ACM International Conference on Wireless Sensor Networks and Applications (WSNA), pages 122–131, 2003.
Tao Shu, Sisi Liu, and Marwan Krunz. Secure Data Collection in Wireless Sensor NetworksUsing Randomized Dispersive Routes. IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2009 proceedings.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
