A novel next hop selection based secure routing for wireless ad hoc sensor networks
Tóm tắt
Growing digitization will establish a digital fabric all around us for anytime and anywhere access. This will revolutionize the way we communicate. Wireless networks like Ad hoc and Sensor networks, mesh networks and pico-net etc. will play a crucial role in such materialization. Internet of Things is one such revolution which derives its roots from Ad hoc and Sensor networks. A lot many issues related to privacy and security of the contents, resources and access will also appear on the horizon. Several typical characteristics of these networks like unattended operation, battery operated device, limited transmission range and storage limits the scope of full-fledged secure solutions in terms of routing and information dissemination. Through this proposal we establish a novel approach for selection of next-hop on the path from source to destination. The proposal is evaluated for performance through simulation. The results of the simulations establish the viability and effectiveness of the complete proposal.
Tài liệu tham khảo
Koul A, Patel RB, Bhat VK (2009) Double split based secure multipath routing in adhoc networks. In: IEEE international conference on advances in recent technologies in communication and computing 2009 Oct 27. ARTCom’09, pp 835–839
Qian L, Song N, Li X (2007) Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach. J Netw Comput Appl 30(1):308–330
Karp B, Kung HT (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th annual international conference on mobile computing and networking ACM 2000 Aug 1, pp 243–254
Conti M, Gregori E, Maselli G (2006) Reliable and efficient forwarding in ad hoc networks. Ad Hoc Netw 4(3):398–415
PushpaLakshmi R, Kumar AV (2010) Security aware minimized dominating set based routing in MANET. In: IEEE international conference on computing communication and networking technologies (ICCCNT) 2010 Jul 29, pp 1–5
Soni SJ, Nayak SD (2013) Enhancing security features & performance of AODV protocol under attack for MANET. In: IEEE international conference on intelligent systems and signal processing (ISSP) 2013 Mar 1, pp 325–328
Devi EA, Chitra K (2014) Security based energy efficient routing protocol for Adhoc network. In: IEEE international conference on control, instrumentation, communication and computational technologies (ICCICCT) 2014 Jul 10, pp 1522–1526
Yu L, Li J, Cheng S, Xiong S, Shen H (2014) Secure continuous aggregation in wireless sensor networks. IEEE Trans Parallel Distrib Syst 25(3):762–774
Seo SH, Won J, Sultana S, Bertino E (2015) Effective key management in dynamic wireless sensor networks. IEEE Trans Inf Foren Secur 10(2):371–383
Chang JM, Tsou PC, Woungang I, Chao HC, Lai CF (2015) Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst J 9(1):65–75
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In: Network protocols, proceedings. 10th IEEE international conference on 2002 Nov 12, pp 78–87
Hu F, Sharma NK (2005) Security considerations in ad hoc sensor networks. Ad Hoc Netw 3(1):69–89
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: IEEE security and privacy. proceedings. 2003 symposium on 2003 May 11, pp 197–213
Traynor P, Kumar R, Choi H, Cao G, Zhu S, La Porta T (2007) Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Trans Mob Comput 6(6):663–677