Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey
DOI:
https://doi.org/10.26438/ijcse/v7i1.934937Keywords:
Cluster Based Wireless Sensor Network, Cryptographic Techniques, Data Compression technique,, Mobile Sink nodes, Monitor NodesAbstract
Prominence of wireless sensor networks (WSNs) is expanding ceaselessly in various spaces of day by day life, as they give productive strategy for gathering significant information from the surroundings for use in various applications. Steering in WSNs is the essential usefulness that permits the stream of data created by sensor hubs to the base station, while considering the extreme vitality imperative and the constraints of computational and capacity assets. In fact, this usefulness might be helpless and must be in itself anchored, since regular directing conventions in WSNs give productive steering strategies with low power utilization, yet they don't consider the conceivable assaults. As sensor hubs might be effortlessly caught what's more, traded off, we present a vitality effective secure information transmission in WSNs where we separate the region of enthusiasm for four quadrants and afterward utilizes the methods of both open and private key cryptography utilizing four Mobile Base stations for vitality sparing. We additionally utilize information pressure systems for diminishing the measure of bit transmission. We likewise utilize Monitor Hubs to recognize the inward assaults.
References
[1] Gay, D., Levis, P., and Culler, D. 2007. Software design patternsforTinyOS.PublishedinJournalACMTransactions onEmbeddedComputingSystems(TECS),Volume.6,2007.
[2] Dr. A. Senthilkumar, ?Energy Efficient Secure Multipath Routing Protocol For Wireless Sensor Networks ?, InternationalJournalofEngineeringResearch&Technology (IJERT)Vol. 2 Issue 4, April ?2013
[3] Nidal Nasser and Yunfeng Chen, Secure Multipath Routing Protocol for Wireless Sensor Networks, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW`07), 2007,IEEE
[4] THEODORE ZAHARIADIS, HELEN C. LELIGOU, STAMATIS VOLIOTIS,SOTIRIS MANIATIS, PANAGIOTISTRAKADAS,PANAGIOTISKARKAZIS,An EnergyandTrust-awareRoutingProtocolforLargeWirelessSensorNetworks,Proceedingsofthe9thWSEASInternational Conference on APPLIED INFORMATICS AND COMMUNICATIONS , (AIC`09).
[5] ShivaMurthyG,RobertJohnD?Souza,andGollaVaraprasad.: Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks, IEEE SENSORS JOURNAL, VOL. 12, NO. 10, (2012)
[6] A. Abduvaliyev, et al, ?On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks?, IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237,2013.
[7] Somia Sahraoui, Souheila Bouam , Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks,International Journal of CommunicationNetworks and Information Security (IJCNIS), Vol. 5, No. 3, December 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
