Collection of Data in Secure Way in Wireless Sensor Networks

Abstract

Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks. In this paper, we present four “Multi-path randomized routing Algorithm” a method to send the data multiple ways to classify the data in to normal and attacks in wireless sensor networks. The Pure Random Propagation shares are propagated based on one-hop neighborhood information, sink TTL initial value N in each share and remaining algorithms improve the efficiency of shares based on using two-hop neighborhood information. Our work studies the best algorithm by detecting the comprised nodes with black holes and denial of service in the packet information with Multipath routing algorithms that has not been used before. We analyses the algorithm that have the best efficiency and describes the proposed system.

Authors and Affiliations

Kiran Malik , Sunita

Keywords

Related Articles

Wireless ad-hoc networks Broadcasting Protocol And Routing Characteristics

The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching route...

IMPACT OF ORGANISATIONAL CLIMATE ON JOB SATISFACTION –A COMPARATIVE STUDY

The fast changing world and face of various economies have generated lot of complexities in the business environment .Stiff competition, innovation and research are the key factors that govern success in modern organizat...

Macroeconomic Variables and Stock Market: US Review

This focus of this paper are the effect, implication, impact and realtionship between selected macroeconomic variables and wider US indices S&P 500 and industrial Dow Jones Industrial Average (DJIA). I Consider infl...

Security Processing for High End Embedded System with Cryptographic Algorithms

This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches t...

Performance Analysis of DSDV Protocol Using NS-2

The instantly created network does not have any base infrastructure as used in the conventional networks, but it is compatible with the conventional networks. DSDV is a modification of the conventional Bellman- Ford rout...

Download PDF file
  • EP ID EP108975
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Kiran Malik, Sunita (2012). Collection of Data in Secure Way in Wireless Sensor Networks. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 515-521. https://europub.co.uk/articles/-A-108975