Efficient and Reliable Transmission Mechanism for Wireless Nodes

Abstract

In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks ,where intermediate nodes claim to transmit packets which were no transmitted .These nodes gain higher perferences or priorities the next time they act as the source. In order to tackle such threats a TP is assigned the task of gathering reports and evaluating whether they are genuine or not. This is accomplished in this paper by certain security techniques (hashing, signatures). The reports size are negligible thus large storage spaces are not required. Cheating nodes once detected are barred from the process of transmission. Reports are collected on a periodic basis A good transmission scheme should be secure, and requirelow overhead. However, the existing receipt-based schemes impose significant processing and communication overhead and implementation complexity. Since a trusted party may not be involved in communication sessions, the nodes compose proofs of relaying others’packets, called receipts, and submit them to an offline accounting centre (AC) to clear the payment. The receipts’size is large because they carry security proofs, e.g.,signatures, to secure the payment, which significantly consumes the nodes’ resources and the available bandwidth in submitting them. The AC has to apply a large number of cryptographic operations to verify the receipts, which mayrequire impractical computational power and make the practical implementation of these schemes complex or inefficient. Moreover, since a transaction (relaying packets)value may be very low, the scheme uses micropayment, and thus a transaction’s overhead in terms of submitting and clearing the receipts should be much less than its value.Therefore, reducing the communication and the payment processing overhead is essential for the effective implementation of the payment scheme and to avoid creating a bottleneck at the AC and exhausting the nodes’ resources.

Authors and Affiliations

Feba Grace George , Jaya Varughese , Nithya Mol Antony

Keywords

Related Articles

Real Time Infants monitoring by developing an Embedded Device for incubator

An Incubator is an apparatus for maintaining an infant, especially one that is ill or born before the usual gestation period. Continuous monitoring of physiological parameters is very often necessary for the evaluatio...

Optimized Word Sense Disambiguation in Hindi using Genetic Algorithm

Word Sense Disambiguation (WSD) is a problem of computationally determining which “sense” of a word is activated by the use of the word in particular context. Genetic Algorithm is used to figure out the appropriate m...

A survey on Secure localization with Intrusion Detection System in WSN

In the current scenario Wireless Sensor Network (WSN) is an emerging area for research work. The localization of WSN is an important feature from the researchers point of view. So Security is a major concern in WSN to...

Multi bit Retention Flip-Flop For Zigbee SoC’s

Zigee-SoC is a wireless sensor network which integrates all the components of the Zigbee device in a single chip. Zigbee SoC gives assistance to a number of power modes including standby mode. This standby mode exten...

Cooperative and Riskless Data Publishing in Cloud Computing

This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...

Download PDF file
  • EP ID EP27895
  • DOI -
  • Views 223
  • Downloads 0

How To Cite

Feba Grace George, Jaya Varughese, Nithya Mol Antony (2014). Efficient and Reliable Transmission Mechanism for Wireless Nodes. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27895