Abstract

Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes.

Highlights

  • IntroductionThe Wireless Sensor Networks contain several mobile nodes which form communication among themselves without a fixed infrastructure

  • How to cite this paper: Nandhakumar, S. and Malmurugan, Dr.N. (2016) Efficient Routing Protocol Based on Security for Wireless Sensor Networks

  • Reliable Routing Protocol for Defending Against Wormhole Attacks 1) Source node S sends a message to Destination node D in order to create a shared secret session key for the communication link using IRSA algorithm

Read more

Summary

Introduction

The Wireless Sensor Networks contain several mobile nodes which form communication among themselves without a fixed infrastructure. Wireless networks have limited bandwidth resource, and their nodes have high mobility. It have high rate of link breakage, which leads to high partitioning rate of the network. The node mobility and limited communication resources make routing very difficult in WSNs. The existing path can break by the causes of regular topology changes by the mobility. Multiple “good” paths instead of a single “best” path for routing is consider in the multipath routing It establishes multiple paths between pairs of begin and end of the communication network and requires more hosts to be responsible for the routing tasks

Wormhole Attacks in WSNs
Related Work
Performance Analysis
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.