Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Wireless Sensor Network (WSN) are the emerging and challenging technology with low processing and battery power. Security becomes a major issue in WSN; because of its wireless nature it is prone to various types of attacks and losing of data packet. Secure routing is important to avoid this type of issues. They are many techniques are available to provide secure routing to WSN. In the proposed work, our main aim is to find the trusted node and routing is done through the node to provide secure routing. The trusted node is identified by using MAC model and it is rated. And also giving the un trusted node a chance to relay prove its identity. It provides the security features with minimum overhead and energy efficiency.

Authors and Affiliations

Keywords

Related Articles

Crowdedness Spot Acquisition by Using Mobility Based Clustering

Detecting hot spots of moving vehicles in an urban area is absolutely required to many smart city applications. Crowdedness spot is a crowded area with a number of irregular objects. The practical investigation on hot sp...

Impact of Employees’ Work Culture on Bank Customers

Abstract: In this era of competition and technological advancement, in order to develop and enhance a stronger customer-base, customers’ perceptions and expectations from the providers of services have become important,...

Determinants of Farmers’ Participation Decision on Local Seed Multiplication in Amhara Region,Ethiopia: A Double Hurdle Approach

"This study is intended to identify the determinants of farmers’ participation in local seed multiplication and to assess the level of farmers’ participation in wheat and potato seed multiplication in Amhara region, Ethi...

Security Issues in Hybrid Cloud Computing

Cloud computing is solution in which resources such as hardware, software, network and storage requirement are provided to the user as per the demand. Basically Cloud computing is the combination of private cloud and pub...

Literature Survey on Outlier Detection Techniques For Imperfect Data Labels

Abstract- A dataset may contain objects that do not comply with the general behaviour or model of data .These data objects are outlier. Outlier detection has attracted increasing attent...

Download PDF file
  • EP ID EP363923
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

(2015). Secure Routing in Wireless Sensor Networks through the Identified Trusted Node. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-363923