A Novel Approach to Secure Routing Protocols in WSN

被引:0
作者
Patil, Bharati [1 ]
Kadam, Rutuja [1 ]
机构
[1] GHRCEM, Dept Elect & Telecommun, Pune, Maharashtra, India
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018) | 2018年
关键词
black hole attack; network lifetime; security; trust; wireless sensor networks; MDT; ERCD; DS2RC; ENERGY; SYSTEM; TRUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years Wireless Sensor Networks (WSNs) are widely used and therefore it's creating critical situation for security of application. WSNs have quite a lot of constraints, like less computation capability, not as much of storage capability, controlled energy resources, power limitations, liability to physical capture, in addition to use of insecure wireless communication channels. The previous system has some issues such as low performance, low security, etc. and now for solving those problems this paper is represents the use of secure routing protocol to improve security of network. Most routing protocols are deal with simple network failures (e.g., links going up and down, nodes crashing and restarting etc.), and thus can have many insecurity when facing a strategically placed intruder. The most solemn attacks is black hole attacks which creating the problem in transferring packets. For that reason we have proposed secure and trustable routing technique with utilizing multi data flow topologies (MDT) scheme to defend against this attack and proposed a suite of optimization methods to minimize the energy cost while keeping the system's security in a sufficient level. Concept is efficiently and effectively schedule tasks depending on sensor nodes' locations and target nodes' trustworthiness. Using that choose the trusted node for security purpose. And that's why in that optimizing the network lifetime and success in security of packets behind the black hole attacks.
引用
收藏
页码:1094 / 1097
页数:4
相关论文
共 50 条
[31]   Modelling Secure Wireless Sensor Networks Routing Protocols with Timed Automata [J].
Tobarra, Llanos ;
Cazorla, Diego ;
Cuartero, Fernando ;
Jose Pardo, J. .
PM2HW2N'08: PROCEEDINGS OF THE THIRD ACM INTERNATIONAL WORKSHOP ON PERFORMANCE MONITORING, MEASUREMENT, AND EVALUATION OF HETEROGENEOUS WIRELESS AND WIRED NETWORKS, 2008, :51-58
[32]   A Trust-Based Secure Hybrid Framework for Routing in WSN [J].
Saini, Komal ;
Ahlawat, Priyanka .
RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 :585-591
[33]   A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN [J].
Nandhini, M. ;
Priya, P. .
2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, :1061-1065
[34]   SecDL: QoS-Aware Secure Deep Learning Approach for Dynamic Cluster-Based Routing in WSN Assisted IoT [J].
Sujanthi, S. ;
Nithya Kalyani, S. .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) :2135-2169
[35]   A novel approach for clustering and routing in WSN using genetic algorithm and equilibrium optimizer [J].
Heidari, Ehsan ;
Movaghar, Ali ;
Motameni, Homayun ;
Barzegar, Behnam .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (10)
[36]   Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things [J].
Haseeb, Khalid ;
Islam, Naveed ;
Almogren, Ahmad ;
Din, Ikram Ud .
IEEE ACCESS, 2019, 7 :185496-185505
[37]   A Survey of Secure Mobile Ad Hoc Routing Protocols [J].
Abusalah, Loay ;
Khokhar, Ashfaq ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :78-93
[38]   Secure Routing Protocols for MANET-enabled IoT [J].
Gupta, Aruna ;
Sasikala, T. .
2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
[39]   Secure opportunistic routing protocols: methods, models, and classification [J].
Mahmood Salehi ;
Azzedine Boukerche .
Wireless Networks, 2019, 25 :559-571
[40]   Secure Routing Protocols for Mobile Ad Hoc Networks [J].
Moudni, Houda ;
Er-rouidi, Mohamed ;
Mouncif, Hicham ;
El Hadadi, Benachir .
2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,