scispace - formally typeset
Journal ArticleDOI

An optimized distributed secure routing protocol using dynamic rate aware classified key for improving network security in wireless sensor network

S. S. Sathya, +1 more
- 01 Jul 2021 - 
- Vol. 12, Iss: 7, pp 7165-7171
TLDR
A dynamic rate aware classified key distributional secure routing (DRCKDS) is proposed, in which the sensor nodes maintain various factors related to the neighbor like energy, transmission involvement, rate of success and so on.
Abstract
To transmit information over the industrial network today, you need data in a secure way to make it a high security root. Routing security issues in the wireless web network have been well studied. The problem of security in routing in wireless mesh networks (WMN) has been well studied. There exist numerous techniques to resolve this issue but differ and suffer to achieve higher security performance in WMN. To resolve this issue, a dynamic rate aware classified key distributional secure routing (DRCKDS) is proposed. In this approach, the sensor nodes maintain various factors related to the neighbor like energy, transmission involvement, rate of success and so on. According to this, available routes are identified to reach the destination from the source. For each route identified, the method computes the secure route measure (SRM). According to the SRM value, an optimal route is selected for the transmission. Similarly, the method generates different secret keys and distributes them through the transmission route selected. The same key has been used to encrypt the data and forward the packet through the route selected. The method improves the security performance and improves the quality of service of WMN.

read more

Citations
More filters
Journal ArticleDOI

Flow Based Efficient Data Gathering in Wireless Sensor Network Using Path-Constrained Mobile Sink

TL;DR: Two efficient algorithms to improve the data gathering process using a mobile sink, where the mobile sink efficiently collects data from nearby sensors while moving along a pre-specified path with constant speed are proposed.
Journal ArticleDOI

A Trusted Distributed Routing Scheme for Wireless Sensor Networks Using Block Chain and Jelly Fish Search Optimizer Based Deep Generative Adversarial Neural Network (Deep-GANN) Technique

TL;DR: A trusted distributed routing scheme for WSN Using Block chain and Jelly Fish Search Optimizer algorithm (JSOA) based Deep Generative Adversarial Neural Network (DGANN) method is proposed to overcome the black hole problem.
Journal ArticleDOI

An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN

TL;DR: In this article, an adaptive trust sector-based authenticated system (ATSAS) is proposed, which is meant to evaluate the trust confidence value of each node with the help of agent sinks node.
Journal ArticleDOI

SecAODV: A Secure Healthcare Routing Scheme Based on Hybrid Cryptography in Wireless Body Sensor Networks

TL;DR: The results show that SecAODV improves end-to-end delay, throughput, energy consumption, packet delivery rate (PDR), and packet loss rate (PLR) in the network simulator version 2 (NS2) simulator.
References
More filters
Journal ArticleDOI

Secure Routing for Wireless Mesh Networks

TL;DR: Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
Journal ArticleDOI

Flow based efficient data gathering in wireless sensor network using path-constrained mobile sink

TL;DR: In this paper, the authors proposed two efficient algorithms to improve the data gathering process using network flow approach for efficient data forwarding in WSNs, where the mobile sink efficiently collects data from nearby sensors while moving along a pre-specified path with constant speed.
Journal ArticleDOI

Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks

TL;DR: A Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs is proposed and based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.
Journal ArticleDOI

Fuzzy based novel clustering technique by exploiting spatial correlation in wireless sensor network

TL;DR: More realistic three-dimensional correlation model is defined where cluster heads are elected on the basis of the correlation value, residual energy, and required energy and a fuzzy-based clustering technique is proposed to further implement the developed correlation model.
Journal ArticleDOI

A ring-based multicast routing topology with QoS support in wireless mesh networks

TL;DR: An algorithm to enhance the IP multicast routing on the ring topology with support from infrastructure nodes for group communications in WMNs is proposed and the end-to-end delay is reduced and the capacity of multicast network is increased as compared to conventional schemes.
Related Papers (5)
Trending Questions (1)
How can routing be considered a key component of network security?

Routing plays a crucial role in network security by enabling secure data transmission. The proposed DRCKDS protocol enhances security in wireless sensor networks by dynamically distributing classified keys for optimal routing.