Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Wireless Sensor Networks comprises of thousands of sensor nodes that are low power and low cost. WSNs have gained wide applicability recently. Also, the major part of applications are real time and critical like Military, environmental monitoring etc. Thus, WSNs are highly susceptible to vulnerabilities. Hence, security of data is a very important issue. Every layer of the network is subjected to security threat. This paper concentrates on the network layer security. This paper presents a node disjoint multipath routing protocol which is not only energy efficient but also trust based. Energy efficiency is observed by using multipath routing. Also security is imparted by selecting the best path among multipaths based on maximum residual energy and trust among the nodes. Then, public crypto system is applied over the data and it is forwarded through the best path.
Keywords: Node Disjoint, Multipath Routing, Security, Cryptography, Trust, Encryption, Digital Signature
Edition: Volume 4 Issue 3, March 2015
Pages: 1069 - 1073
How to Cite this Article?
Rucha Agrawal, Simran Khiani, "Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152215, Volume 4 Issue 3, March 2015, 1069 - 1073
129 PDF Views | 69 PDF Downloads
Similar Articles with Keyword 'Multipath Routing'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1353 - 1357Algorithm to Increase Energy Efficiency and Coverage for Wireless Sensor Network
Aphrin S Pathan, Shabda Dongavkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 741 - 745Priority Queuing Approach for Video Streaming Over Mobile Adhoc Network Using WEAC Protocol
A. Kamatchi, Dr. Annasaro Vijendran
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1667 - 1673Geographical Distance Based Multipath Routing With Temporal Features in Wireless Sensor Network
Nilesh P. Nivalkar, Anil D. Gujar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 2588 - 2590A Shortest Path & Directed Acyclic Graph Based Technique for Multipath Routing
Uttara Batham, Mayank Bhatt
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Similar Articles with Keyword 'Trust'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1384 - 1390Sherpa - Experts Social Network
Sangramsingh M Ghatage, Siddharth K Gaikwad
Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 431 - 433Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring
Arjumand Arshi, Dr. Sameena Banu
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018
Pages: 137 - 140Intelligent Health and Education Trust Recommendation System
Bhavin Rathod; Deepraj Sawant; Tejas Shetye; Silviya D'Monte
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Similar Articles with Keyword 'Digital Signature'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1936 - 1939Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way
D. Hemalatha, R. Arunudaya
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1475 - 1480Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1140 - 1143Intrusion-Detection System for MANETs
S. Srihari Reddy, S. Z. Parveen