A Novel Approach to Secure Routing Protocols in WSN

被引:0
|
作者
Patil, Bharati [1 ]
Kadam, Rutuja [1 ]
机构
[1] GHRCEM, Dept Elect & Telecommun, Pune, Maharashtra, India
关键词
black hole attack; network lifetime; security; trust; wireless sensor networks; MDT; ERCD; DS2RC; ENERGY; SYSTEM; TRUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years Wireless Sensor Networks (WSNs) are widely used and therefore it's creating critical situation for security of application. WSNs have quite a lot of constraints, like less computation capability, not as much of storage capability, controlled energy resources, power limitations, liability to physical capture, in addition to use of insecure wireless communication channels. The previous system has some issues such as low performance, low security, etc. and now for solving those problems this paper is represents the use of secure routing protocol to improve security of network. Most routing protocols are deal with simple network failures (e.g., links going up and down, nodes crashing and restarting etc.), and thus can have many insecurity when facing a strategically placed intruder. The most solemn attacks is black hole attacks which creating the problem in transferring packets. For that reason we have proposed secure and trustable routing technique with utilizing multi data flow topologies (MDT) scheme to defend against this attack and proposed a suite of optimization methods to minimize the energy cost while keeping the system's security in a sufficient level. Concept is efficiently and effectively schedule tasks depending on sensor nodes' locations and target nodes' trustworthiness. Using that choose the trusted node for security purpose. And that's why in that optimizing the network lifetime and success in security of packets behind the black hole attacks.
引用
收藏
页码:1094 / 1097
页数:4
相关论文
共 50 条
  • [1] Analysis of Typical Secure Routing Protocols in WSN
    He, Jingsha
    Zhou, Bo
    Liu, Ruohong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 41 - 50
  • [2] A novel approach of WSN routing protocols comparison for forest fire detection
    Noureddine Moussa
    Abdelbaki El Belrhiti El Alaoui
    Claude Chaudet
    [J]. Wireless Networks, 2020, 26 : 1857 - 1867
  • [3] A novel approach of WSN routing protocols comparison for forest fire detection
    Moussa, Noureddine
    El Alaoui, Abdelbaki El Belrhiti
    Chaudet, Claude
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 1857 - 1867
  • [4] A Novel Blockchain Secure to Routing Protocol in WSN
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Boubaker, Atef
    Trabelsi, Hafedh
    [J]. 2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [5] A Game Theoretic Approach for Optimal and Secure Routing in WSN
    Lazrag, Hilmi
    Saadane, Rachid
    Aboutajdine, Driss
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT-AECIA 2016, 2018, 565 : 218 - 228
  • [6] A Comparative Study of Routing Protocols in WSN
    Aznaoui, Hanane
    Raghay, Said
    Aziz, Layla
    Ait-Mlouk, Addi
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2015,
  • [7] Improving Routing Protocols of WSN in WHSN
    Tan, Ruochen
    Xu, Yang
    Chen, Zheng
    Zha, Min
    Tsou, Tina
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 56 - 60
  • [8] A Secure Anonymous Routing Protocol in WSN
    Yang, Guang
    Geng, Guining
    Song, Jing
    Liu, Zhaohui
    Han, He
    Gao, Xiangang
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2013, : 415 - 418
  • [9] How Secure are Secure Interdomain Routing Protocols?
    Goldberg, Sharon
    Schapira, Michael
    Hummon, Peter
    Rexford, Jennifer
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 87 - 98
  • [10] How secure are secure interdomain routing protocols?
    Goldberg, Sharon
    Schapira, Michael
    Hummon, Pete
    Rexford, Jennifer
    [J]. COMPUTER NETWORKS, 2014, 70 : 260 - 287