Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey
Suresh Kumar1 , Kalpana Midha2
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 934-937, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.934937
Online published on Jan 31, 2019
Copyright © Suresh Kumar, Kalpana Midha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Suresh Kumar, Kalpana Midha, “Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.934-937, 2019.
MLA Style Citation: Suresh Kumar, Kalpana Midha "Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey." International Journal of Computer Sciences and Engineering 7.1 (2019): 934-937.
APA Style Citation: Suresh Kumar, Kalpana Midha, (2019). Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey. International Journal of Computer Sciences and Engineering, 7(1), 934-937.
BibTex Style Citation:
@article{Kumar_2019,
author = {Suresh Kumar, Kalpana Midha},
title = {Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {934-937},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5186},
doi = {https://doi.org/10.26438/ijcse/v7i1.934937}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.934937}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5186
TI - Secure Routing Algorithm Forwireless Sensor Networks- Impact & Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Suresh Kumar, Kalpana Midha
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 934-937
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
150 | 209 downloads | 204 downloads |
Abstract
Prominence of wireless sensor networks (WSNs) is expanding ceaselessly in various spaces of day by day life, as they give productive strategy for gathering significant information from the surroundings for use in various applications. Steering in WSNs is the essential usefulness that permits the stream of data created by sensor hubs to the base station, while considering the extreme vitality imperative and the constraints of computational and capacity assets. In fact, this usefulness might be helpless and must be in itself anchored, since regular directing conventions in WSNs give productive steering strategies with low power utilization, yet they don`t consider the conceivable assaults. As sensor hubs might be effortlessly caught what`s more, traded off, we present a vitality effective secure information transmission in WSNs where we separate the region of enthusiasm for four quadrants and afterward utilizes the methods of both open and private key cryptography utilizing four Mobile Base stations for vitality sparing. We additionally utilize information pressure systems for diminishing the measure of bit transmission. We likewise utilize Monitor Hubs to recognize the inward assaults
Key-Words / Index Term
Cluster Based Wireless Sensor Network, Cryptographic Techniques, Data Compression technique, Mobile Sink nodes, Monitor Nodes
References
[1] Gay, D., Levis, P., and Culler, D. 2007. Software design patternsforTinyOS.PublishedinJournalACMTransactions onEmbeddedComputingSystems(TECS),Volume.6,2007.
[2] Dr. A. Senthilkumar, ?Energy Efficient Secure Multipath Routing Protocol For Wireless Sensor Networks ?, InternationalJournalofEngineeringResearch&Technology (IJERT)Vol. 2 Issue 4, April ?2013
[3] Nidal Nasser and Yunfeng Chen, Secure Multipath Routing Protocol for Wireless Sensor Networks, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW`07), 2007,IEEE
[4] THEODORE ZAHARIADIS, HELEN C. LELIGOU, STAMATIS VOLIOTIS,SOTIRIS MANIATIS, PANAGIOTISTRAKADAS,PANAGIOTISKARKAZIS,An EnergyandTrust-awareRoutingProtocolforLargeWirelessSensorNetworks,Proceedingsofthe9thWSEASInternational Conference on APPLIED INFORMATICS AND COMMUNICATIONS , (AIC`09).
[5] ShivaMurthyG,RobertJohnD?Souza,andGollaVaraprasad.: Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks, IEEE SENSORS JOURNAL, VOL. 12, NO. 10, (2012)
[6] A. Abduvaliyev, et al, ?On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks?, IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237,2013.
[7] Somia Sahraoui, Souheila Bouam , Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks,International Journal of CommunicationNetworks and Information Security (IJCNIS), Vol. 5, No. 3, December 2013.