We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Credit based Security Scheme (CBSS) for Multihop Routing in Wireless Sensor Networks

by Mary Cherian, Anvitha A.s
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 9
Year of Publication: 2013
Authors: Mary Cherian, Anvitha A.s
10.5120/12524-9039

Mary Cherian, Anvitha A.s . A Credit based Security Scheme (CBSS) for Multihop Routing in Wireless Sensor Networks. International Journal of Computer Applications. 72, 9 ( June 2013), 34-39. DOI=10.5120/12524-9039

@article{ 10.5120/12524-9039,
author = { Mary Cherian, Anvitha A.s },
title = { A Credit based Security Scheme (CBSS) for Multihop Routing in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 9 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number9/12524-9039/ },
doi = { 10.5120/12524-9039 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:37:30.077770+05:30
%A Mary Cherian
%A Anvitha A.s
%T A Credit based Security Scheme (CBSS) for Multihop Routing in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 9
%P 34-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In most of the scenarios, communication in Wireless Sensor Network (WSN) takes place via multihop routing. Multihop routing does not provide much protection against identity deception, developed through the replay of routing information. This defect can be exploited by an opponent to launch several harmful attacks or even attacks that destroy the routing protocols, misdirecting the network traffic which results in disastrous consequences. In order to secure the multihop routing in WSNs from the adversaries, a Credit Based Security Scheme (CBSS) for WSN is proposed. CBSS, not only reduce the negative impacts from intruders but it also proves energy-efficient by incorporating the trustworthiness of the nodes into the routing decisions. The focus of this paper is to increase the Packet Delivery Ratio and offer an energy efficient route to the base station even in the presence of wormhole attack by incorporating Credit Based Security Scheme (CBSS). CBSS is proved effective through extensive evaluation with simulation using NS2.

References
  1. Guoxing Zhan, WeisongShi, and Julia Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs", IEEE Transactions on Dependable and Secure Computing, vol. 9, No. 2, March/April 2012.
  2. F. Zhao and L. Guibas , Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, 2004.
  3. M. Jain and H. Kandwal, "A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks" Proc. International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT '09), pp. 555-558, 2009.
  4. C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Proc. First IEEE International Workshop Sensor Network Protocols and Applications, 2003.
  5. T. Ghosh, N. Pissinou, and K. Makki, "Collaborative Trust-Based Secure Routing against Colluding Malicious Nodes in Multi-Hop Ad Hoc Networks", Proc. 29th IEEE International Conference Local Computer Networks, pp. 224-231, Nov. 2004.
  6. A. Rezgui and M. Eltoweissy, "Tarp: A Trust-Aware Routing Protocol for Sensor-Actuator Networks", Proc. IEEE International Conference Mobile AdHoc and Sensor Systems (MASS '07), 2007.
  7. T. Zahariadis, H. Leligou, P. Karkazis, P. Trakadas, I. Papaefstathiou, C. Vangelatos, and L. Besson, "Design and Implementation of a Trust-Aware Routing Protocol for Large WSNs", International Network Security and its Applications, vol. 2, No. 3, pp. 52-68, July 2010.
  8. A. Woo, T. Tong, and D. Culler, "Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks", Proc. First ACM International Conference Embedded Networked Sensor Systems (SenSys '03), Nov. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks multihop routing identity deception credit value energy rate