期刊文献+

Efficient Routing Protocol Based on Security for Wireless Sensor Networks

Efficient Routing Protocol Based on Security for Wireless Sensor Networks
下载PDF
导出
摘要 Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes. Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes.
作者 S. Nandhakumar Dr. N. Malmurugan S. Nandhakumar;Dr. N. Malmurugan(Department of Computer Science Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, India;Department of Electronics and Communication Engineering, Mahendra College of Engineering, Salem, India)
出处 《Circuits and Systems》 2016年第8期1943-1953,共11页 电路与系统(英文)
关键词 WSNS THROUGHPUT Integrated Cryptography Scheme Delivery Ratio Packet Loss AUTHENTICATION Data Integrity Communication Overhead and End to End Delay WSNS Throughput Integrated Cryptography Scheme Delivery Ratio Packet Loss Authentication Data Integrity Communication Overhead and End to End Delay
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部