A Novel Approach to Secure Routing Protocols in WSN

被引:0
作者
Patil, Bharati [1 ]
Kadam, Rutuja [1 ]
机构
[1] GHRCEM, Dept Elect & Telecommun, Pune, Maharashtra, India
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018) | 2018年
关键词
black hole attack; network lifetime; security; trust; wireless sensor networks; MDT; ERCD; DS2RC; ENERGY; SYSTEM; TRUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years Wireless Sensor Networks (WSNs) are widely used and therefore it's creating critical situation for security of application. WSNs have quite a lot of constraints, like less computation capability, not as much of storage capability, controlled energy resources, power limitations, liability to physical capture, in addition to use of insecure wireless communication channels. The previous system has some issues such as low performance, low security, etc. and now for solving those problems this paper is represents the use of secure routing protocol to improve security of network. Most routing protocols are deal with simple network failures (e.g., links going up and down, nodes crashing and restarting etc.), and thus can have many insecurity when facing a strategically placed intruder. The most solemn attacks is black hole attacks which creating the problem in transferring packets. For that reason we have proposed secure and trustable routing technique with utilizing multi data flow topologies (MDT) scheme to defend against this attack and proposed a suite of optimization methods to minimize the energy cost while keeping the system's security in a sufficient level. Concept is efficiently and effectively schedule tasks depending on sensor nodes' locations and target nodes' trustworthiness. Using that choose the trusted node for security purpose. And that's why in that optimizing the network lifetime and success in security of packets behind the black hole attacks.
引用
收藏
页码:1094 / 1097
页数:4
相关论文
共 50 条
[21]   Limitations of on demand secure routing protocols [J].
Ramachandran, P ;
Yasinsac, A .
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, :52-59
[22]   A New Trust Model to secure Routing Protocols against DoS attacks in MANETs [J].
Echchaachoui, Adel ;
Kobbane, Abdellatif ;
Elkoutbi, Mohammed .
2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015,
[23]   Routing protocol design for secure WSN: Review and open research issues [J].
Zin, Shazana Md ;
Anuar, Nor Badrul ;
Kiah, Miss Laiha Mat ;
Pathan, Al-Sakib Khan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 :517-530
[24]   Review on energy-efficient routing protocols in WSN [J].
Ram G.M. ;
Ilavarsan E. .
Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 :851-871
[25]   S-DV: A new approach to secure distance vector routing protocols [J].
Babakhouya, Abdelaziz ;
Challal, Yacine ;
Bouabdallah, Abdelmadjid ;
Gharout, Said .
2006 SECURECOMM AND WORKSHOPS, 2006, :427-+
[26]   A Novel Mechanism to Secure Internal Attacks in HWMP Routing Protocol [J].
Ben-othman, Jalel ;
Claude, Jean-Pierre ;
Benitez, Yesica I. Saavedra .
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
[27]   Achieving Energy Efficiency through Load Balancing: A Comparison through Formal Verification of two WSN Routing Protocols [J].
Khan, Naveed Ahmed ;
Saghar, Kashif ;
Ahmad, Rizwan ;
Kiani, Adnan K. .
2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, :350-354
[28]   Comparative analysis of energy efficient routing protocols with optimization in WSN [J].
Sreedevi, Pogula ;
Venkateswarlu, S. .
INTERNATIONAL JOURNAL OF INTERACTIVE DESIGN AND MANUFACTURING - IJIDEM, 2022,
[29]   Simulation Based Evaluation of MANET Routing Protocols for Static WSN [J].
Ihbeel, Ali A. S. ;
Sigiuk, Hasein Issa ;
Alhnsh, Abdelhadi A. .
2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, :63-68
[30]   Modelling Secure Wireless Sensor Networks Routing Protocols with Timed Automata [J].
Tobarra, Llanos ;
Cazorla, Diego ;
Cuartero, Fernando ;
Jose Pardo, J. .
PM2HW2N'08: PROCEEDINGS OF THE THIRD ACM INTERNATIONAL WORKSHOP ON PERFORMANCE MONITORING, MEASUREMENT, AND EVALUATION OF HETEROGENEOUS WIRELESS AND WIRED NETWORKS, 2008, :51-58