TITLE

STUDYING THE EFFECTS OF MALICIOUS NODES USING GEOGRAPHIC ROUTING PROTOCOL IN THE WSN

AUTHOR(S)
ABUSAIMEH, HESHAM
PUB. DATE
December 2012
SOURCE
International Journal of Reviews in Computing;Dec2012, Vol. 12, p44
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this paper, studying the effect of malicious nodes in the Wireless Sensor Networks (WSNs) is proposed. The low-cost, low data rate of the sensor nodes made the WSN a hot topic among researchers. Certain characteristics like dynamic topologies, limited data rate and limited battery power makes routing in WSN challenging compared to traditional networks. Earlier work on WSNs mainly focused on developing efficient routing mechanisms in dynamic and resource-constrained networks. Several efficient routing protocols were suggested for WSNs where most assume a trusted and cooperative environment. However, they are all vulnerable to attacks by malicious nodes; routing attacks in WSNs are especially serious. Geographic routing research is more recent than topological routing; it has received special attention as improvement in geographic information produces better routing performance. In this study, the effect of the malicious nodes on geographic routing is investigated. Simulations are conducted to evaluate the performance degradation of network due to malicious node activity. Simulation studies conducted for network with 15% malicious nodes show that the throughput of the network degrades significantly.
ACCESSION #
90489632

 

Related Articles

  • A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks. Gopi, T.; Santhi, B. // International Journal of Engineering Science & Technology;Feb/Mar2013, Vol. 5 Issue 1, p293 

    Wireless sensor network are event-driven network systems consist of collection of sensor nodes that are deployed to monitor physical and environmental conditions. In Wireless sensor network, whenever an event is detected, then the data related to the event need to be sent to the sink node (data...

  • An Energy Aware Distributed Clustering Algorithm Using Fuzzy Logic for Wireless Sensor Networks with Non-uniform Node Distribution. Nokhanji, Nooshin; Hanapi, Zurina; Subramaniam, Shamala; Mohamed, Mohamad // Wireless Personal Communications;Sep2015, Vol. 84 Issue 1, p395 

    Clustering routing protocols are more adequate for Wireless Sensor Networks (WSNs) due to the higher energy utilization rate and scalability. However, non-uniform node deployment makes the cluster-based routing protocols less efficient, since the energy consumption of the nodes is more...

  • M²E² : A Novel Multi-hop Routing Protocol for Wireless Body Sensor Networks. Rafatkhah, Omid; Lighvan, Mina Zolfy // International Journal of Computer Networks & Communications Secu;Aug2014, Vol. 2 Issue 8, p260 

    Wireless Body Sensor Networks (WBSN) systems will enable people to monitor themselves with devices that give proactive warnings of illness so that they can turn to their doctors earlier, when intervention can be the most effective. In this paper, we propose a reliable, Energy efficient and high...

  • LEACH-Based Energy-Conserved Improved Protocol for WSNs. Wei WEI; PEIYI SHEN; LIANG ZHANG; HU XU; JUAN SONG; WENZHENG ZHANG; Wei Wang // International Journal of Digital Content Technology & its Applic;Dec2012, Vol. 6 Issue 23, p163 

    In wireless sensor networks (WSNs) environment, since the battery limitation of the node energy, energy efficiency is an key factor should be considered as the communication methods are designing. As classical and hierarchical routing protocols, Leach Protocol plays an important role. In...

  • Application of Wireless Sensor Network to Make Transportation Fleet Information Systems Smart. GHARAGOZLU, ALI; IZADI, MEHDI // International Journal of Computer Networks & Communications Secu;Oct2014, Vol. 2 Issue 10, p355 

    Traffic signs are tools to control and regulate movement, on streets and crossings. These signs individually play their own essential role in reducing accidents and securing traffic. Unfortunately, thieves steal these signs on suitable occasions to sell them as scrape in black market. Wireless...

  • An Energy-aware Routing Scheme in Delay Tolerant Mobile Sensor Networking. Zhe Chen; Feng Yang; Shiyong Huang; Wenxue Yang // Sensors & Transducers (1726-5479);Aug2014, Vol. 176 Issue 8, p125 

    In Delay Tolerant Mobile Sensor Networking (DTMSN), mobile sensor nodes are usually limited to their energy capacity, one important concern in routing design of DTMSN is energy consumption. This paper presents a number of variations of the Epidemic Routing Protocol (ERP) to extend the DTMSN...

  • An ECC-Based Secure Routing Protocol for Wireless Sensor Network. Yingyou Wen; Zhi Li; Shuyi Chen; Hong Zhao // Sensors & Transducers (1726-5479);Aug2014, Vol. 176 Issue 8, p165 

    In this paper, the problems of secure routing for wireless sensor network are studied. According to the special secure routing requirements of the WSN, an ECC based secure routing algorithm for WSN is presented and implemented. This algorithm has the advantages of low energy consumption, light...

  • DECH: Equally Distributed Cluster Heads Technique for Clustering Protocols in WSNs. Sundareswaran, P.; Vardharajulu, K.; Rajesh, R. // Wireless Personal Communications;Sep2015, Vol. 84 Issue 1, p137 

    Recent research works focus on the development of wireless sensor networks, leading to the arrival of new protocols. One of the goals of a routing protocol is reducing the power consumption. Clustering techniques are used in routing protocols to increase network lifetime and reduce network...

  • Research on the Automatic routing technology in the Logistics system and IOT. Ou Yang Baicheng // Applied Mechanics & Materials;2014, Issue 608-609, p665 

    With the rapid development of logistics enterprises, tradition logistics sorting has been unable to meet the needs of the development of express logistics. Combining with the RFID technology, the paper proposes a new way of logistics sorting and data routing. By increasing the RFID tag and the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics