Enhancing and Securing the Routing Techniques in Wireless Sensor Networks

Authors(1) :-Dr. Rupinder Singh

A wireless network node network (WSN) is defined as being composed of a large number of small light weighted nodes called network node nodes with routing, processing and communication facilities, which are densely deployed in physical or environmental condition. Each of these nodes collects data and its purpose is to route this information back to a sink. WSN is highly constrained type of network, having network node nodes with more capabilities. All network node nodes in the wireless network node network are interact with each other by intermediated network node nodes. Physical parameters computations are power, energy, memory, communication range and bandwidth. Wireless ad-hoc networks mainly use broadcast communication. Upon deployment, network node nodes automatically collaborate and form a network, start collecting data without any input from the user. The proposed model has been improved for the route metric calculation along with node and link load availability information module to avoid the connectivity loopholes and link congestions. The proposed model results have been obtained in the form of various network performance parameters such as network load, transmission delay, throughput, energy consumption, etc. In wireless sensor networks, there are many types of attacks that can hinder or obstruct the data to be deliver to the authenticated node so in order to check which node is authenticated various algorithms have been proposed. There are various attacks like Denial of Service, Distributed Denial of Service and various types of Jamming attacks that can disrupt or deny the communication between sender and receiver. It is important to develop some powerful tools for network analysis, design and managing the performance optimization of the network. In this paper some of the most common attacks and threats are explained and the prevention that can be taken by using various tools is implemented. Also the different routes are configured if the particular route is not available. All the nodes and the attacks are been shown by using a simulator NS2.

Authors and Affiliations

Dr. Rupinder Singh
Assistant Professor, Chandigarh Group of Colleges, Landran, Ajitgarh, Punjab, India

Scheduling Algorithm, Routing, Wireless, Sensor Network

  1. J. Zhu, X. Hu, X. Chen, “Minimum data aggregation time problem in wireless ad-hoc networks” in: Proc. of MSN’05, pp.133-142, IEEE, 2005.
  2. Yee Wei law & Paul J. M Havinga, “How to Secure a Wireless Network node Network” University of Twente, IEEE Proceedings of the International Conference on intelligent Network nodes, Network node Networks and Information Processing Conference, page no.89-95, 2005.
  3. Rajagopalan, Ramesh and Varshney, Parmod K., “ Data Aggreagtion Techniques in Network node networks: A survey”(2006). Electrical Engineering and computer Science.Paper 22. http://surface.syr.edu/eecs/22, 2006.
  4. O.D. Incel, Amitabha Ghosh, B. Krishnamachari, K. Chintalapudi,”Fast data collection in tree-based wireless ad-hoc networks,” 2008.
  5. O. Goussevskaia, T. Moscibroda, R. Wattenhofer,”Local broadcasting in the physical interference model,” in Proc. Of DIALM-POMC’08, 2008.
  6. J. Yick, B. Mukherjee, D. Ghosal, “Wireless Network node Network Survey”, Computer Networks, Volume 52, Issue 12, pp 2292-2330, 2008.
  7. P.J. Wan, S.C.H. Huang, L. Wang, Z. wan, X.Jia, ” Minimum-latency aggregation scheduling in multihop wireless networks”, in: proc. of MOBIHOC’09, ACM, 2009.
  8. O. Goussevskaia, R. Wattenhofer, M.M. Halldorsson, E. Welzl,” Capacity of arbitrary wireless network,” in: Proc. of INFOCOM’09, IEEE, 2009.
  9. X.Y. Li, X. Xu, S. Wang, S. Tang, G. Dai, J. Zhao,Y. Qi,”Efficient data aggregation in multi-hop wireless ad-hoc networks under physical interference model”, in: Proc. of MASS’09, pp. 353-362, IEEE, 2009.
  10. T. Issariyakul, E. Hossain, Introduction to Network Simulator NS2, DOI: 10.1007/978-0-387-71760-9 1, c_ Springer Science+Business Media, LLC 2009.
  11. Gaurav Sharma, “Routing in Wireless ad-hoc networks”, chapter 2, pp 5, May 2009.
  12. Hongxing Li, Q.S. Hua, Chaun Wu,”Minimum-latency aggregation scheduling in wireless ad-hoc networks under physical interference model,” in: proc. Of MSWiM’10, 2010.

Publication Details

Published in : Volume 6 | Issue 2 | March-April 2020
Date of Publication : 2020-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 141-145
Manuscript Number : CSEIT206242
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. Rupinder Singh, "Enhancing and Securing the Routing Techniques in Wireless Sensor Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.141-145, March-April-2020. Available at doi : https://doi.org/10.32628/CSEIT206242
Journal URL : https://res.ijsrcseit.com/CSEIT206242 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview