Open Access Open Access  Restricted Access Subscription or Fee Access

Dynamic Security in Wireless Networks by Using Multiple Path Routing Algorithm

V. Saranya, S. Thiripurasundari

Abstract


Wireless sensor networks (WSN) has two basic attacks while transferring packets from source to destination. They are Compromise Node (CN) attack and Denial of Service (DOS) attack. CN will cooperate with the hacker so that they can find the paths of neighbour routes easily, in DOS the hacker finds the node and block the information. In both CN and DOS black holes are generated which will not transmit the received packets. To overcome these attacks in WSN randomized multiple path algorithm is used. So, every node in the network receives the packets and retransmits it once. Even though the hacker finds the randomized multiple path routes they cannot point out the routes traversed by each packet which is not feasible. By using this algorithm the routes become highly dispersive and it becomes energy efficient. In the proposed system the black holes formed in CN and DOS are overcome by using DSDV (Destination Sequenced Distance Vector Routing) and RIP(Routing Information Protocol)protocols. Instead of selecting pre-computed set of routes, multiple paths are set by the nodes randomly. So, at each time the information packets are send in different paths by which the packets can be sent securely. Large numbers of routes are generated for each source and destinations where the hackers cannot hack the packets easily. Thus, it is difficult for the hackers to compromise or jam all possible routes from source to destination which is practically infeasible.

Keywords


Wireless Sensor Networks, Black Holes, Multiple Path Routing, Secure Packet Delivery.

Full Text:

PDF

References


Tao Shu, Marwan Krunz, and Sisi Liu, “Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes“ IEEE TRANSACTIONS on mobile computing, vol. 9, no. 7, july 2010

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002

T. Claveirole, M.D. de Amorim, M. Abdalla, and Y. Viniotis,“Securing Wireless Sensor Networks Against Aggregator Compromises,” IEEE Comm. Magazine, vol. 46, no. 4, pp. 134-141, Apr.2008.

P.C. Lee, V. Misra, and D. Rubenstein, “Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks,” IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1490-1501, Dec. 2007.

W. Lou, W. Liu, and Y. Fang, “Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, vol. 4, pp. 2404-2413, Mar. 2004.

K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks,” Proc.IEEE INFOCOM, 2006.

D.R. Stinson, Cryptography, Theory and Practice. CRC Press, 2006.

B. Vaidya, J.Y. Pyun, J.A. Park, and S.J. Han, “Secure Multipath Routing Scheme for Mobile Ad Hoc Network,” Proc. IEEE Int’l Symp. Dependable, Autonomic and Secure Computing, pp. 63-171, 2007.

A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.

Yang, F. Ye, Y. Yuan, S. Lu, H. and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proc. ACM MobiHoc, 2005.

Z. Ye, V. Krishnamurthy, and S.K. Tripathi, “A Framework for Reliable Routing in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, vol. 1, pp. 270-280, Mar. 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.