Rate the Article: Secure Routing in Wireless Sensor Networks through the Identified Trusted Node, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 112 | Views: 424

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Rating: 6.2 / 10


Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel


Abstract: Wireless Sensor Network (WSN) are the emerging and challenging technology with low processing and battery power. Security becomes a major issue in WSN, because of its wireless nature it is prone to various types of attacks and losing of data packet. Secure routing is important to avoid this type of issues. They are many techniques are available to provide secure routing to WSN. In the proposed work, our main aim is to find the trusted node and routing is done through the node to provide secure routing. The trusted node is identified by using MAC model and it is rated. And also giving the un trusted node a chance to relay prove its identity. It provides the security features with minimum overhead and energy efficiency.


Keywords: Wireless Sensor Networks, Secure Routing, Secure Hash Algorithm


Edition: Volume 4 Issue 4, April 2015,


Pages: 685 - 689



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top