International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 110 | Views: 169

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection

Sanghavi Parkhi | Hemlata Dakhore

Abstract: In this paper, we will propose redundancy management of heterogeneous wireless sensor networks (HWSNs), using multihop routing to answer user queries in the existence of unreliable and malicious nodes. The key concept behind of our redundancy management is to exploit the balancing between energy consumption vs. timeliness, and security to increase the system useful lifetime. We will use an algorithm for Redundancy Management for identifying the best redundancy level to apply to multihop routing for intrusion tolerance, to increase the query success probability and system lifetime. Then we will use a voting-based distributed intrusion detection algorithm to detect and evict malicious nodes in a HWSN. We will develop a new probability model to analyze the best redundancy level in terms of path redundancy and source redundancy, and also the best intrusion detection in terms of the number of voters under which the lifetime of a HWSN is increased. We will then apply the analysis results obtained to the design of a particular redundancy management algorithm to identify and apply the best design parameter settings at run time in response to environment changes, to increase the HWSN lifetime. A prototype implementation in the ns2click simulator will be used to demonstrate malicious attacks launched by intruder nodes.

Keywords: Wireless sensor networks, multi-hop routing, timeliness, security, energy conservation, Trust-Based Intrusion Detection

Edition: Volume 3 Issue 11, November 2014,

Pages: 1292 - 1295

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait