Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Security in Wireless Sensor Network Using Multipath Routing

A.Ancey Sneha, V. Sampath Kumar

Abstract


Network is the process of transforming information between two nodes. Data’s are transmitted in a form of packet via single path routing either route Multipath routing. Single path routing has source and the destination but multipath routing involves intermediate nodes between source and destination. During transmission there may occur some problem like packet drop, attacks, unreliable data transfer which may lead to many unexpected results. Wireless Sensor network (WSN) is used for many real time applications. This paper put together the need for security in networks and different types of attacks that occur in WSN. It also focuses how well the malicious node are detected and diagnosed and also the algorithm used for secure data transfer. This paper incorporates the clustering approach which is used for energy consumption in WSN. A selected choice of research article were fused into this paper to facilitate the ease of a researcher searching for article related to WSN which in event makes the study of the researcher more competent.

Keywords


Networks, Wireless Sensor Networks (WSN), Routing, Multipath Routing, Attacks, Security.

Full Text:

PDF

References


S. Bo, L. Osborne, X. Yang, and S. Guizani, “Intrusion detection techniques in mobile ad hoc and wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 14, no. 5, pp. 560–563, 2007

B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: reliable information forwarding using multiple paths in sensor networks,” in Proc. 2003 IEEE Conf. Local Computer Netw., pp. 406–415. networks,” in Proc. 2007 IEEE Asia-Pacific Service Comput. Conf., pp.49–55.

Eliana stavrou, Andreas pitsillides, “Survey on secure multipath routing protocols in WSN”, University of Cyprus.

Y. X. Jiang and B. H. Zhao, “A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks:attacks and counter measures,” in Proc. 2003 IEEE Int. Workshop SensorNetw. Protocols Appl., pp. 113–127.

Kewei Sha, Jegnesh Gehlot and Robert Greve, “Multipath techniques in wireless sensor networks : survey”.

T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, 2010.

O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366–379, 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.