Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes

The Compromised-node and denial-of- service are two key attacks in wireless sensor networks (WSNs).We study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we