Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Data Transmission in Wireless Sensor Network using Randomized Multipath Routes

K. Soundar Rajan

Abstract


In wireless sensor network there are various possible security threats encountered during data delivery. They are Compromised node, Denial of service, Hello flood attack, Wormhole attack and Sybil attack. Here, we are combating against the first two attacks namely Compromised Node and Denial of service. These two attacks generate the black holes. The black holes are the areas within which the adversary can either passively intercept or actively block information delivery.  In existing system, Multipath Routing approaches are vulnerable to such attacks.  Because, once an attacker acquires the routing algorithm, he can compute the routes traversed by each packet and endanger all the information sent over these routes.

In proposed system, we develop the Randomized Multipath Routes that bypass the black holes formed by those two attacks. In this routing mechanism, the routes traversed by each packet change over time. So, even if the attacker acquires this mechanism, he cannot pinpoint the routes traversed by each packet. Also we use two cryptographic processes namely; encryption and decryption for secure data transmission.


Keywords


Randomized Multi-Path Routing, Wireless Sensor Network, Secure Data Delivery

Full Text:

PDF

References


Akyildiz. I. F., Su. W., Sankarasubramaniam. Y. andCayirci. E. (2002) ‘A survey on sensor networks’, IEEE Communications Magazine, 40(8): 102–114.

Barrett. C. L., Eidenbenz. S. J., Kroc. L., Marathe. M. and Smith. J. P. (2003) ‘Parametric probabilistic sensor network routing’, In Proceedings of the ACM International Conference on Wireless Sensor Networks and Applications (WSNA), pages 122–131.

Burmester. M. and Le. T. V. (2004) ‘Secure multipath communication in mobile ad hoc networks’, In Proceedings of the International Conference on Information Technology: Coding and Computing, pages 405–409.

Claveirole. T., de Amorim. M. D., Abdalla. M. and Viniotis. Y. (2008) ‘Securing wireless sensor networks against aggregator compromises’, IEEE Communications Magazine, pages 134–141.

Johnson. D. B., Maltz. D. A. and Broch. J. (2001) ‘DSR: the dynamic source routing protocol for multihop wireless ad hoc networks’, In C. E. Perkins, editor, Ad Hoc Networking, Addison- Wesley, pages 139–172.

Lee. P. C., Misra. V. and Rubenstein. D. (2005) ‘Distributed algorithms for secure multipath routing’, In Proceedings of the IEEE INFOCOM Conference, pages 1952–1963.

Lee. P. C., Misra. V. and Rubenstein. D. (2007) ‘Distributed algorithms for secure multipath routing in attack-resistant networks’, IEEE/ACM Transactions on Networking, 15(6):1490–1501.

Lee. S. J. andGerla. M. (2001) ‘Split multipath routing with maximally disjoint paths in ad hoc networks’, In Proceedings of the IEEE ICC Conference, pages 3201–3205.

Li. X. Y., Moaveninejad. K. and Frieder. O. (2005) ‘Regional gossip routing wireless ad hoc networks’, ACM Journal of Mobile Networks and Applications, 10(1-2):61–77.

Lou. W. and Kwon. Y. (2006) ‘H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks’, IEEE Transactions on Vehicular Technology, 55(4):1320–1330.

Lou. W., Liu. W. and Fang. Y. (2004) ‘Spread: enhancing data confidentiality in mobile ad hoc networks’, In Proceedings of the IEEE INFOCOM Conference, volume 4, pages 2404–2413.

Maxemchuk. N. F., (1975) ‘Dispersity routing’, In Proceedings of the IEEE ICC Conference, pages 41.10–41.13.

Tao Shu, Marwan Krunz and Sisi Liu Department of Electrical and Computer Engineering University of Arizona. ‘Secure data collection in wireless sensor network’.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.