DRFSD: Directed Restricted Flooding For Secure Data-Aggregation In Wireless Sensor Networks

Secured Data Transmission is a major issue in Wireless Sensor Networks (WSNs). In this paper we have proposed Directed Restricted Flooding Protocol (DRFSD) in WSNs. This protocol is better than H-SPREAD (Hybrid Security Protocol for REliable dAta Delivery). In DRFSD, alternate multipaths are selected based on the sensor node, that are placed at 180? direction with the Base Station (BS). This scheme is ef?cient in sending the Data Packets to the Base Station in shorter duration than the H-SPREAD. Simulation Results show that our algorithm approach performs well with respect to latency in comparison with earlier algorithms

[1]  R. Gupta,et al.  Secure Multipath routing in Wireless Sensor Networks , 2012 .

[2]  Ling Li,et al.  Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks , 2014, IEEE Systems Journal.

[3]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[4]  Zhongming Zheng,et al.  Secure and Energy-Efficient Disjoint Multipath Routing for WSNs , 2012, IEEE Transactions on Vehicular Technology.

[5]  Wenjing Lou,et al.  An efficient N-to-1 multipath routing protocol in wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[6]  Reza Curtmola,et al.  BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks , 2007, IEEE Transactions on Mobile Computing.

[7]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[8]  Wenjing Lou,et al.  H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.

[9]  C. Venkatesh,et al.  Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network , 2012, ArXiv.

[10]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[11]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  U. Izhar,et al.  GPS-based landmine detection system for multiple operating units , 2012, 2012 International Conference of Robotics and Artificial Intelligence.

[14]  Hannes Frey,et al.  Lower and upper bounds for multicasting under distance dependent forwarding cost functions , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.