Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Wireless Sensor Networks comprises of thousands of sensor nodes that are low power and low cost. WSNs have gained wide applicability recently. Also, the major part of applications are real time and critical like Military, environmental monitoring etc. Thus, WSNs are highly susceptible to vulnerabilities. Hence, security of data is a very important issue. Every layer of the network is subjected to security threat. This paper concentrates on the network layer security. This paper presents a node disjoint multipath routing protocol which is not only energy efficient but also trust based. Energy efficiency is observed by using multipath routing. Also security is imparted by selecting the best path among multipaths based on maximum residual energy and trust among the nodes. Then, public crypto system is applied over the data and it is forwarded through the best path.

Keywords: Node Disjoint, Multipath Routing, Security, Cryptography, Trust, Encryption, Digital Signature

Edition: Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Share this Article

How to Cite this Article?

Rucha Agrawal, Simran Khiani, "Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152215, Volume 4 Issue 3, March 2015, 1069 - 1073

170 PDF Views | 93 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Multipath Routing'

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 126 , Downloads: 104 | CTR: 83 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 741 - 745

Priority Queuing Approach for Video Streaming Over Mobile Adhoc Network Using WEAC Protocol

A. Kamatchi, Dr. Annasaro Vijendran

Share this Article

Views: 135 , Downloads: 104 | CTR: 77 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1353 - 1357

Algorithm to Increase Energy Efficiency and Coverage for Wireless Sensor Network

Aphrin S Pathan, Shabda Dongavkar

Share this Article

Views: 128 , Downloads: 104 | CTR: 81 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2588 - 2590

A Shortest Path & Directed Acyclic Graph Based Technique for Multipath Routing

Uttara Batham, Mayank Bhatt

Share this Article

Views: 133 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1699 - 1703

Multipath Routing in Delay Tolerant Networks Using Hypercube Based Social Feature

Prajakta B. Bhosale, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'Security'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 38 , Downloads: 31 | CTR: 82 % | Weekly Popularity: ⮙13

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 167 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'Cryptography'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 159 , Downloads: 90 | CTR: 57 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 141 , Downloads: 99 | CTR: 70 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'Trust'

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 181 , Downloads: 68 | CTR: 38 %

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 137 - 140

Intelligent Health and Education Trust Recommendation System

Bhavin Rathod; Deepraj Sawant; Tejas Shetye; Silviya D'Monte

Share this Article

Views: 137 , Downloads: 81 | CTR: 59 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Views: 121 , Downloads: 84 | CTR: 69 % | Weekly Popularity: ⮙2

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 431 - 433

Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring

Arjumand Arshi, Dr. Sameena Banu

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'Encryption'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Similar Articles with Keyword 'Digital Signature'

Views: 159 , Downloads: 90 | CTR: 57 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 127 , Downloads: 101 | CTR: 80 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Views: 155 , Downloads: 104 | CTR: 67 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Views: 148 , Downloads: 105 | CTR: 71 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article
Top