Advertisement

Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation

  • Maqsood Mahmud
  • Abdulrahman Abdulkarim Mirza
  • Ihsan Ullah
  • Naveed Khan
  • Abdul Hanan Bin Abdullah
  • Mohammad Yazid Bin Idris
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6485)

Abstract

This paper presents a routing protocol architecture based on recursive group algorithm. This algorithm apply Group Verification Tree approach which makes the sensor network secure and make it safer from malicious intrusions and illegitimate users. The proposed approach will give a new dimension to the fast and secure routing in the sensor networks with less energy to be consumed. Based on the analysis and simulation the proposed strategies yield better results than the existing results.

Keywords

Group Verification Tree Malicious Routing Protocol Wireless Sensor Networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Xiao, D., Wei, M., Zhou, Y.: Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks. In: 1st IEEE Conference on Industrial Electronics and Applications, pp. 1–4 (2006), doi:10.1109/ICIEA.2006.257149Google Scholar
  2. 2.
    IEEE 64th Vehicular Technology Conference VTC 2006, pp. 1–5 (Fall 2006), doi:10.1109/VTCF.2006.505Google Scholar
  3. 3.
    Akyildiz, S., et al.: Wireless Sensor Networks: A Survey (2002)Google Scholar
  4. 4.
    Ganesan, D., et al.: Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. Mobile Comp. and Commun. Review 5(4), 10–24 (2002)Google Scholar
  5. 5.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. In: Proc. IEEE INFOCOM 2003 (2003)Google Scholar
  6. 6.
    Parno, B., Luk, M., Gaustad, E., Perrig, A.: Secure Sensor Network Routing: A Clean Slate Approach (2006)Google Scholar
  7. 7.
    Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 11-14, p. 197 (2003)Google Scholar
  8. 8.
    Tejaswi, K., Mehta, P., Bansal, R., Parekh, C., Merchant, S.N., Desai, U.B.: Routing Protocols for Landslide Prediction using Wireless Sensor Networks (2006)Google Scholar
  9. 9.
    Roy, S., Setia, S., Jajodia, S.: Attack-resilient hierarchical data aggregation in sensor networks. In: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, Alexandria, Virginia, USA, October 30 (2006)Google Scholar
  10. 10.
    Chan, H., Perrig, A., Przydatek, B., Song, D.: SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15(1), 69–102 (2007)CrossRefGoogle Scholar
  11. 11.
    Srinivasan, A., Wu, J.: A novel k-parent flooding tree for secure and reliable broadcasting in sensor networks. In: Proceedings of IEEE International Conference on Communications—Computer and Communications Network Security, ICC CCN (2007)Google Scholar
  12. 12.
    Srinivasan, A., Wu, J.: Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. In: Security Comm. Networks, Wiley InterScience, Hoboken (2008)Google Scholar
  13. 13.
    Roman, R., Lope, J.: Integrating wireless sensor networks and the internet: a security analysis. Journal of Internet Research 19(2), 246–259 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Maqsood Mahmud
    • 1
    • 3
    • 4
  • Abdulrahman Abdulkarim Mirza
    • 1
    • 4
  • Ihsan Ullah
    • 2
  • Naveed Khan
    • 2
  • Abdul Hanan Bin Abdullah
    • 3
  • Mohammad Yazid Bin Idris
    • 3
  1. 1.Department of Information SystemKing Saud UniversitySaudi Arabia
  2. 2.Department of Computer Science, College of Computer and Information SciencesKing Saud UniversitySaudi Arabia
  3. 3.Faculty of Computer Science and Information SystemsUniversiti Teknologi MalaysiaMalaysia
  4. 4.Center of Excellence in Information Assurance (CoEIA)King Saud UniversitySaudi Arabia

Personalised recommendations