SGR: Secure geographical routing in Wireless Sensor Networks

Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems(GPS). This helps to easily detect the position of their neighboring nodes. The power consumption is more in the existing routing algorithms, since the nodes build the routing tables and the neighboring node IDs are determined by searching the routing table. In this paper, we have proposed Secure Geographical Routing (SGR) algorithm in which the data traffic and energy consumption is minimized using single copy data transfer. In SGR, initially one copy is transmitted to the next node using greedy approach and another copy is preserved in the sending station. If acknowledgment is not received even after timeout then the second copy is transmitted. This dynamic single copy scheme reduces the data traffic in Wireless Sensor Networks. Security algorithms are incorporated in every sensor node to prevent any malicious node attack that disturb the normal functioning of the network. Simulation result shows that the performance of the proposed algorithm is better in terms of packet delivery probability and energy consumption in comparison with existing algorithms.

[1]  Raheem A. Beyah,et al.  VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[2]  Qun Shi Power Management in Networked Sensor Radios A Network Energy Model , 2007, 2007 IEEE Sensors Applications Symposium.

[3]  Cauligi S. Raghavendra,et al.  Single-copy routing in intermittently connected mobile networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[4]  Özgür B. Akan,et al.  Event-to-sink reliable transport in wireless sensor networks , 2005, IEEE/ACM Transactions on Networking.

[5]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[6]  Mianxiong Dong,et al.  Secure Routing for Wireless Mesh Sensor Networks in Pervasive Environment , 2007 .

[7]  Oliver W. W. Yang,et al.  Efficient Event Detecting Protocol in Event-Driven Wireless Sensor Networks , 2011, IEEE Sensors Journal.

[8]  Özgür B. Akan,et al.  ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.

[9]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[10]  KD Kang Securing Geographic Routing in Wireless Sensor Networks , 2006 .

[11]  Chen Qian,et al.  Geographic Routing in $d$-Dimensional Spaces With Guaranteed Delivery and Low Stretch , 2011, IEEE/ACM Transactions on Networking.

[12]  Reza Curtmola,et al.  BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks , 2007, IEEE Transactions on Mobile Computing.

[13]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[14]  Wenjing Lou,et al.  Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.

[15]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.