Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of Reliable Routing to Prevent Inter Hop Verification in Wireless Sensor Network Using Onion Protocol

G. Pradeepa, D. Nivedha, M. Nandini


In the EXISTING SYSTEM, malicious nodes can repeatedly break routes. Breaking the routes increases the packet delivery latency. In the PROPOSED SYSTEM, based on request response source selects routing path. After that source hashing neighbor nodes id, data with timestamp. Then it transmits the data to destination using E-STAR protocol.  In the MODIFICATION PROCESS, the modification is our implementation. Where we deploy onion protocol. Every node while registering, server will provided with Id, primary key, secondary key and decryption key. Source will findout the optimum path and it will collect primary key of all intermediate node. Data’s first encrypted using AES algorithm and then with corresponding primary key of all the hops. This wholesome is transmitted to first hop, where initial decryption is achieved using decryption key of that node. Then collecting its id and secondary key which is transmitted to both source and destination node. Same way all the id’s and secondary key are collected and concatenated, so as to verify both source and destination. TPA implementation is also achieved for successful validation of concatenated keys their by reward is provided to the intermediate hops

Full Text:



G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.

C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.

S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, pp. 255-265, Aug. 2000.

X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3, pp. 229-242, 2012.

G. Indirania and K. Selvakumara, “A Swarm-Based Efficient Distributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET),” Int’l J. Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103, 2014.

H. Li and M. Singhal, “Trust Management in Distributed Systems,” Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007.

K. Liu, J. Deng, and K. Balakrishnan, “An Acknowledgement- Based Approach for the Detection of Routing Misbehavior in MANETs,” IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.

S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.