TITLE

Preventive Alternate Path Routing Algorithm against Intrusion in Sensor Area Network

AUTHOR(S)
Pahuja, Swimpy; Singhrova, Anita
PUB. DATE
April 2013
SOURCE
International Journal of Computer Theory & Engineering;Apr2013, Vol. 5 Issue 2, p188
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper presents a secure alternate path routing scheme in the field of wireless sensor networks. Our alternate path scheme provides a non-greedy route establishment approach for data dissemination among spatially distributed sensor nodes in wireless sensor networks. It proposes the new algorithm for the purpose of path computation which starts from the initialization of the network. The algorithm has been designed to improve routing security in wireless sensor network. The algorithm uses alternative routing paths for each data transmission call to overcome the sensor network attack. To enhance network reliability, the algorithm allows sensory data to be sent on defined routing paths using various intermediate transmission nodes.
ACCESSION #
87746669

 

Related Articles

  • Framework for Secure Wireless Communication in Wireless Sensor Networks. Usama, Muhammad; Muhaya, Fahad T. Bin // International Journal of Distributed Sensor Networks;2013, p1 

    With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. WSNs have many fields of applications that are playing an essential role in increasing productivity and reducing cost. The restricted...

  • Security Threats in Wireless Sensor Networks in Each Layer. Sastry, Anitha S.; Sulthana, Shazia; Vagdevi, S. // International Journal of Advanced Networking & Applications;2013, Vol. 4 Issue 4, p1657 

    As the Wireless Sensor Networks (WSN) prove to be more beneficial in real-world applications. At the same time threatened by vulnerabilities. The threats faced by these WSN are similar but not limited to those observed in a simple network of computers or Internet. Attacks at all the layers of...

  • Efficient Routing Algorithm for Wireless Networks based on Bandwidth and Clock Rate. Premkumar, Anto; James, Shijo; Saranya, R. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1099 

    The algorithm inculcates the use of dynamic - distance vector routing protocols such as RIP, RIPV2, IGRP, and EIGRP to determine the path. These routing protocols will determine the best path by analysing only the hop count. i.e. if a packet goes through a router it refers to one hop. So the...

  • Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks. de Dieu, Imanishimwe Jean; Assouma, Nyirabahizi; Muhamad, Maniraguha; Wang Jin; Sungyoung Lee // International Journal of Distributed Sensor Networks;2012, p1 

    To collect the data and transmit them on the base station is the main task of the sensor nodes in wireless sensor networks (WSNs). This transmission requires a specific routing algorithm. To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we...

  • Energy Efficient Cluster-Based Intrusion Detection System for Wireless Sensor Networks. Abdullah, Manal; Alsanee, Ebtesam; Alseheymi, Nada // International Journal of Advanced Computer Science & Application;Sep2014, Vol. 5 Issue 9, p10 

    Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications that...

  • Security, Speed Driving WSN Needs. Reinke, Jeff // Wireless Design & Development;Mar/Apr2013, Vol. 21 Issue 2, p16 

    The article presents feedbacks from readers of the magazine regarding new wireless sensor networks (WSN) applications, trends, and obstacles. When asked about where the greatest demand for WSN existed, 25 percent said industrial marketplace. The readers also identified some common and unique...

  • Securing Cognitive Wireless Sensor Networks: A Survey. Fragkiadakis, Alexandros; Angelakis, Vangelis; Tragos, Elias Z. // International Journal of Distributed Sensor Networks;2014, p1 

    Wireless sensor networks (WSNs) have gained a lot of attention recently due to the potential they provide for developing a plethora of cost-efficient applications. Although research on WSNs has been performed for more than a decade, only recently has the explosion of their potential...

  • Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey. LABRAOUI, NABILA; GUERROUI, MOURAD; ALIOUAT, MAKHLOUF; ZIA, TANVEER // Adhoc & Sensor Wireless Networks;2011, Vol. 12 Issue 3/4, p295 

    No abstract available.

  • Secure Aggregated Routing Protocol in WSN -- A Review. Anuradha M. P.; Ganapathy, Gopinath // International Journal of Computer Applications;Aug2014, Vol. 100, p17 

    Wireless sensor Networks (WSN) require secure aggregated routing of sensor data transmitted from source node to the sink node for most of its applications. Several existing routing protocols are explained in this paper with aggregation for WSN's are explored. The main objective of this paper...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics