International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks

Author NameAuthor Details

M. Kavitha, B. Ramakrishnan, Resul Das

M. Kavitha[1]

B. Ramakrishnan[2]

Resul Das [3]

[1]Research Scholar, S.T Hindu College, Nagercoil, India.

[2]Department of Computer Science and Research Centre, S.T Hindu College, Nagercoil, India.

[3]Department of Software Engineering, Firat University, Elazig, Turkey.

Abstract

Packet loss is a major issue in Wireless Sensor Network (WSN) data transmission which is caused by malicious packet dropping and link error. In conventional methods, the malicious dropping may result in a packet loss rate that is comparable to normal channel losses, the stochastic processes that characterizes the two phenomena exhibited in different correlation which would affect the network performance i.e. detection accuracy. By detecting the correlations between lost packets, we will decide whether the packet loss is purely due to regular link errors, or is a combined effect of link error and malicious drop. In order to overcome these issues, we have proposed a HLA (Homomorphic Linear Authentication) based on routing protocol which is a collusion proof mechanism and resolves the public auditing problem. Here, the proposed technique will be implemented in OLSR (Optimized Link State Routing) Protocol. The actual status of each packet transmission i.e., the packet loss information can be described by our technique. The network simulation results describe the performance of the proposed method in terms of detection accuracy in low computation complexity. Our HLA based OLSR protocol is compared with existing AODV, RIP and other protocols.

Index Terms

WSN

AODV

OLSR

HLA

malicious node attack

Link Error

Reference

  1. 1.
    K. Gaj and P. Chodowiec, “FPGA and ASIC Implementations ofAES,” Cryptographic Engineering, pp. 235-294, Springer, 2009.
  2. 2.
    A. Shamir, How to Share a Secret, Communications of the ACM, 22(11): 612-613, November 1979.
  3. 3.
    L. Lamport, Password Authentication with Insecure Communication,Communications of the ACM, 24(11): 770-772, November 1981.
  4. 4.
    A. J. Menezes, P. C. van Oorschotand S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, October 1996.
  5. 5.
    H. Deng, W. Li and D. P. Agrawal, Routing security in wireless adhoc networks, IEEE Commun. Mag., 40(10): 70-75, October 2002.
  6. 6.
    Biswas, Suparna, and Subhajit Adhikari. "A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network."International Journal of Computer Applications 131.17 (2015): 28-35.
  7. 7.
    Ramakrishnan, B., R. S. Rajesh, and R. S. Shaji. "An efficient vehicular communication outside the city environments." International Journal of Next-Generation Networks (IJNGN) Vol 2 (2010).
  8. 8.
    B.Ramakrishnan.,M.selvi,R.BhagavanthNishanth “Efficient Measure Of Routing Protocols In Vehicular Ad Hoc Networks Using Freeway Mobility Model”, Wireless Networks, PP: 1-11 (2015).
  9. 9.
    Ramakrishnan, B. "Performance analysis of AODV routing protocol in Vehicular ad-hoc network service discovery architecture." Network 13.14 (2009): 65-72.
  10. 10.
    Joe, M. Milton, B. Ramakrishnan, and R. S. Shaji. "Modeling GSM based network communication in vehicular network." International Journal of Computer Network and Information Security 6.3 (2014): 37.
  11. 11.
    TaoShuand Marwan Krunz,“Privacy Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Adhoc Networks”,IEEE Transactions on Mobile Computing, Vol.14,no.4,April 2015.
  12. 12.
    B.Awerbuch,R.Curtmola,D.Holmer,C.Nita-Rotaru, and H.Rubens, “ODSBR: An on demand secure byzantine resilient routing protocol for wireless ad hoc networks”,ACMTrans.InformSyst.Security,vol.10.no.4,pp.1-35,2008.
  13. 13.
    K.Balakrishnan, J.Dengand, P.K.Varshney, “TWOACK Preventing selfishness in mobile ad hoc networks,” in Proc. IEEEWirelessCommun Network Conf., 2005, pp.2137-2142.
  14. 14.
    E.GerhardsPadilla,N.Aschenbruck,P.Martini,M.Jahnke and J.Tolle. “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”, InProc. Of the 33rd IEEE Conference on Local Computer Networks (LCN), Dublin,Ireland, and October 2007.
  15. 15.
    Daş, R., Karabade, A., Tuna, G., (2015), “Common Network Attack Types and Defense Mechanisms”, IEEE 23. Signal Processing Applications Conference (SİU-2015), 16-19 May 2015, InonuUniversity, Malatya.
  16. 16.
    W.Yu,Y.Sun and K.R.liu ,HADOF:Defense Against Routing Disruptions in mobile ad hoc networks,InProc.24thIEEEINFOCOM,Miami,USA,March 2005.
  17. 17.
    Ramakrishnan, B., S. R. Sreedivya, and M. Selvi. "Adaptive routing protocol based on cuckoo search algorithm (ARP-CS) for secured vehicular ad hoc network (VANET)." International Journal of computer networks and applications (IJCNA) 2.4 (2015): 173-178.
  18. 18.
    Merlyn, A. Anuba, and A. Anuja Merlyn. "Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network." International Journal of Computer Networks and Applications 1.1 (2014): 1-10.
  19. 19.
    Baykara, M., DaÅŸ, R., (2015)."A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems", International Journal of Computer Networks and Applications (IJCNA), 2(5), 203-211.
  20. 20.
    Shaji, R. S., R. S. Rajesh, and B. Ramakrishnan. "An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networks”, International Journal of Computer Science and Information Technologies, Vol. 1 (5) , 2010, 355-362.
  21. 21.
    Namesh, C., and Dr B. Ramakrishnan. "Analysis of VBF protocol in Underwater Sensor Network for Static and Moving Nodes." International Journal of Computer Networks and Applications 2.1 (2015): 20-26..
  22. 22.
    Nishanth, R. Bhagavath, B. Ramakrishnan, and M. Selvi. "Improved signcryption algorithm for information security in networks." International Journal of Computer Networks and Applications (IJCNA) 2.3 (2015): 151-157.
  23. 23.
    Karadogan, İ., Daş, R., (2015). “Analysis of Attack Types on TCP/IP Based Networks via Exploiting Protocols)”, IEEE 23. Signal Processing Applications Conference (SİU-2015), 16-19 May 2015, İnönü Üniversitesi, Malatya.
SCOPUS
SCImago Journal & Country Rank