Secure Routing in Wireless Sensor Networks through the Identified Trusted Node
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Wireless Sensor Network (WSN) are the emerging and challenging technology with low processing and battery power. Security becomes a major issue in WSN, because of its wireless nature it is prone to various types of attacks and losing of data packet. Secure routing is important to avoid this type of issues. They are many techniques are available to provide secure routing to WSN. In the proposed work, our main aim is to find the trusted node and routing is done through the node to provide secure routing. The trusted node is identified by using MAC model and it is rated. And also giving the un trusted node a chance to relay prove its identity. It provides the security features with minimum overhead and energy efficiency.

Keywords: Wireless Sensor Networks, Secure Routing, Secure Hash Algorithm

Edition: Volume 4 Issue 4, April 2015

Pages: 685 - 689

Share this Article

How to Cite this Article?

D. Latha, K. Palanivel, "Secure Routing in Wireless Sensor Networks through the Identified Trusted Node", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=8041502, Volume 4 Issue 4, April 2015, 685 - 689

106 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Wireless Sensor Networks'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3170 - 3173

Wireless Sensor Networks for Traffic Congestion Monitoring

Nitish R Chavan, Ravinarayana.B, Ravikumar.D

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Similar Articles with Keyword 'Secure Routing'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1345 - 1348

A Survey on Security Frameworks for Cluster Based Wireless Sensor Networks

Shital Mane, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1571 - 1574

Energy Efficient Secure Routing using Clustering Approach in HWSN

Shani Verma, Maya Shelke

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2379 - 2382

Survey on an Efficient Data Aggregation without Data Loss with Secure Routing in Heterogeneous Wireless Sensor Networks

Shubhangi Gaikwad, S. V. Todkari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2648 - 2653

A Survey Framework on Energy Efficient and Secure Routing Protocol in WSN

Penumolu. Ratnakumari, M. Koteswara Rao

Share this Article

Similar Articles with Keyword 'Secure Hash Algorithm'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 478 - 482

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1717 - 1721

Key Policy Attribute Based Encryption in Cloud Storage

Sonali Deshpande, Dipa Dharmadhikari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this Article
Top