Collection of Data in Secure Way in Wireless Sensor Networks

Abstract

Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks. In this paper, we present four “Multi-path randomized routing Algorithm” a method to send the data multiple ways to classify the data in to normal and attacks in wireless sensor networks. The Pure Random Propagation shares are propagated based on one-hop neighborhood information, sink TTL initial value N in each share and remaining algorithms improve the efficiency of shares based on using two-hop neighborhood information. Our work studies the best algorithm by detecting the comprised nodes with black holes and denial of service in the packet information with Multipath routing algorithms that has not been used before. We analyses the algorithm that have the best efficiency and describes the proposed system.

Authors and Affiliations

Kiran Malik , Sunita

Keywords

Related Articles

AN AUTOMATED RECOGNITION OF FAKE OR DESTROYED INDIAN CURRENCY NOTES IN MACHINE VISION

Almost every country in the world face the problem of counterfeit currency notes, but in India the problem is acute as the country is hit hard by this evil practice. Fake notes in India in denominations of Rs.100, 500 an...

Security Processing for High End Embedded System with Cryptographic Algorithms

This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches t...

Assessment of the Impact of Risk Aggregation on S/w Development Cost Using Soft Computing Techniques

Risk is one of the major factors to decide the software cost, reliability and the software dead lines. As the software proposal is presented along with this risk analysis also begin. With each step of software developmen...

A Cluster Based Keyword Filtration Approach for Web Document Summarization

Summarization, an extremely important technique in Data Mining is an automatic learning technique aimed to extract the most valuable information from a large size document or the articles. The goal is to create the summa...

ENHANCING ORGANIZATIONAL EFFECTIVENESS THROUGH CUSTOMER ENGAGEMENT

Customer satisfaction is “merely the entry point for achieving a deeper foundation that rests on total customer engagement,” by Benson Smith and Tony Rutigliano. Everyone aims to satisfy the customers: in fact, you and y...

Download PDF file
  • EP ID EP108975
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Kiran Malik, Sunita (2012). Collection of Data in Secure Way in Wireless Sensor Networks. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 515-521. https://europub.co.uk/articles/-A-108975