PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks

Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.

[1]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[2]  Kamanashis Biswas,et al.  Energy Efficient Secure Routing in Wireless Sensor Networks , 2016 .

[3]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[4]  Mohammad S. Obaidat,et al.  Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[5]  Xue Liu,et al.  SReD: A Secure REputation-based Dynamic Window Scheme for disruption-tolerant networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[6]  M. Jeyalakshmi Location aware end-end data security using mac for secured wireless sensor networks , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[7]  Chai Kiat Yeo,et al.  A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks , 2010, 2010 Sixth Advanced International Conference on Telecommunications.

[8]  Yogesh Chaba,et al.  An IPC key management scheme for Wireless Sensor Network , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[9]  Jiangwen Wan,et al.  An Effective and Secure Epidemic Routing for Disruption-Tolerant Networks , 2014, 2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics.

[10]  A.N.M. Noman A generic framework for defining security environments of Wireless Sensor Networks , 2008, 2008 International Conference on Electrical and Computer Engineering.

[11]  Kim R. Fowler The future of sensors and sensor networks survey results projecting the next 5 years , 2009, 2009 IEEE Sensors Applications Symposium.

[12]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.