A Novel Approach to Secure Routing Protocols in WSN

被引:0
|
作者
Patil, Bharati [1 ]
Kadam, Rutuja [1 ]
机构
[1] GHRCEM, Dept Elect & Telecommun, Pune, Maharashtra, India
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018) | 2018年
关键词
black hole attack; network lifetime; security; trust; wireless sensor networks; MDT; ERCD; DS2RC; ENERGY; SYSTEM; TRUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years Wireless Sensor Networks (WSNs) are widely used and therefore it's creating critical situation for security of application. WSNs have quite a lot of constraints, like less computation capability, not as much of storage capability, controlled energy resources, power limitations, liability to physical capture, in addition to use of insecure wireless communication channels. The previous system has some issues such as low performance, low security, etc. and now for solving those problems this paper is represents the use of secure routing protocol to improve security of network. Most routing protocols are deal with simple network failures (e.g., links going up and down, nodes crashing and restarting etc.), and thus can have many insecurity when facing a strategically placed intruder. The most solemn attacks is black hole attacks which creating the problem in transferring packets. For that reason we have proposed secure and trustable routing technique with utilizing multi data flow topologies (MDT) scheme to defend against this attack and proposed a suite of optimization methods to minimize the energy cost while keeping the system's security in a sufficient level. Concept is efficiently and effectively schedule tasks depending on sensor nodes' locations and target nodes' trustworthiness. Using that choose the trusted node for security purpose. And that's why in that optimizing the network lifetime and success in security of packets behind the black hole attacks.
引用
收藏
页码:1094 / 1097
页数:4
相关论文
共 50 条
  • [1] A Novel Blockchain Secure to Routing Protocol in WSN
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Boubaker, Atef
    Trabelsi, Hafedh
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [2] ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks
    Liu, Yuxin
    Dong, Mianxiong
    Ota, Kaoru
    Liu, Anfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2013 - 2027
  • [3] A Secure Anonymous Routing Protocol in WSN
    Yang, Guang
    Geng, Guining
    Song, Jing
    Liu, Zhaohui
    Han, He
    Gao, Xiangang
    2013 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2013, : 415 - 418
  • [4] A Review of Trust Based Secure Routing Protocols in MANETs
    Mitra, Prachatos
    Mukherjee, Soham
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [5] Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN
    Alotaibi, Majid
    IEEE ACCESS, 2021, 9 (09): : 159187 - 159197
  • [6] Performance Evaluation of the Network Lifetime for Routing Protocols in WSN
    Senouci, Mustapha Reda
    Mellouk, Abdelhamid
    Aissani, Amar
    Senouci, Hadj
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 2162 - 2167
  • [7] Comparison of LEACH and PEGASIS Hierarchical Routing Protocols in WSN
    Reda El Ouadi, Mohammed
    Hasbi, Abderrahim
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2020, 16 (09) : 159 - 172
  • [8] A Survey on Conventional and Secure Routing Protocols in Wireless Sensor Networks
    Sreenivasulu, A. L.
    Reddy, P. Chenna
    INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 467 - 478
  • [9] A survey on secure multipath routing protocols in WSNs
    Stavrou, Eliana
    Pitsillides, Andreas
    COMPUTER NETWORKS, 2010, 54 (13) : 2215 - 2238
  • [10] Survey of secure multipath routing protocols for WSNs
    Zin, Shazana Md
    Anuar, Nor Badrul
    Kiah, Miss Laiha Mat
    Ahmedy, Ismail
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 55 : 123 - 153