Secure information Collection in Wireless Sensor Networks Using Randomized Routes Approach

23
Secure information Collection in Wireless Sensor Networks Using Randomized Routes Approach Mughele Ese Sophia; School of Science and Technology, Computer Science Option. Delta State School of Marine Technology, Burutu. DESOMATEC Delta State Nigeria. E-mail: [email protected] Ekpoh Chukwunwike Ustus; Information and Communication Technology (ICT). Delta State School of Marine Technology, Burutu. DESOMATEC Delta State Nigeria. E-mail:[email protected]

Transcript of Secure information Collection in Wireless Sensor Networks Using Randomized Routes Approach

Secure information Collection in Wireless Sensor Networks

Using Randomized Routes Approach

Mughele Ese Sophia; School of Science and Technology, Computer

Science Option.

Delta State School of Marine Technology, Burutu. DESOMATEC Delta

State Nigeria.

E-mail: [email protected]

Ekpoh Chukwunwike Ustus; Information and Communication Technology

(ICT). Delta State School of Marine Technology, Burutu. DESOMATEC

Delta State Nigeria.E-mail:[email protected]

ABSTRACT

In wireless sensor network there are various possible security threats encountered during data

delivery, among the various possible threats like information security, node failure, etc. we are

presenting this paper in order to conquer the ‘blackholes’ that are formed due to

compromised-node (CN) and denial-of-service (DoS) by using some routing mechanisms

approach. The existing multi-path routing approaches are vulnerable to such attacks, mainly

due to their deterministic nature. Compromised-node and denial-of-service are two key attacks

in Wireless sensor networks (WSNs). We have developed a structure that generates randomized

routes. Under this design the routes taken by the “shares” of different packets change over time

to time increasing the probability of randomness of paths to be selected for transferring the

data. Hence, even though adversary or offender comes to know about the routing algorithm

still it cannot pinpoint the routes in where each packet is roam randomly. Apart from

randomness, the routes that are generated by these mechanisms are energy efficient as well as

dispersive which ultimately make them capable of circumventing the blackholes at less energy

cost. Extensive frameworks are conducted to verify the validity of our mechanisms.

Keywords: Compromised Node (CN), Denial of service (DOS), and Wireless

Sensor Networks (WSN), Purely Random Propagation (PRP).

1.0 INTRODUCTION WIRELESS sensor networks have applications in many aspects, such as health

care, homeland

Military, security, manufacturing, environment, agriculture, and so on. In

the past several years, sensor networks have been a very active research

area. Most previous research efforts consider homogeneous sensor networks,

where all sensor nodes have the same capabilities. Most of the security

threats in WSNs are compromised node (CN) and denial of service (DOS),

kumar and kumar, www.ijera.com retrieved 20th June, (2014). In the CN

attack, an adversary physically compromises a subset of nodes to

eavesdrop information, whereas in the DOS attack, the adversary

interferes with the normal operation of the network by actively

disrupting, changing, or even paralyzing the functionality of a subset

of nodes. These two attacks are similar in the sense that they both

generate black holes areas within which the adversary can either

passively intercept or actively block data delivery. Particular node

in each route and compromise (or jam) these nodes. Such an attack can

stop all shares of the data, rendering the above counter-attack

approaches ineffective. Second, as pointed out, actually very few

node-disjoint routes can be found when the node density is moderate

and the source and destination nodes are several hops apart, Motharkar

et al (2013).

1.1 Wireless communication

According to Coils (1895) Wireless communication is the transfer of

information between two or more points that are not connected by an

electrical conductor. The most common wireless technologies use

electromagnetic wireless telecommunications, such as radio. With radio

waves, distances can be short such as a few meters for televisions or

as far as thousands or even millions of kilometers for deep-space

radio communications. It encompasses various types of fixed, mobile,

and portable applications, including two-way radios, cellular

telephones, personal digital assistants (PDAs), and wireless

networking. Other examples of applications of radio wireless technology

include GPS units, garage door openers, wireless computer mice,

keyboards and headsets, headphones, radio receivers, satellite

television, broadcast television and cordless telephones. Common

methods of achieving wireless communications include the use of light,

sound, magnetic, or electric fields, (Margaret, 2006. Examples of

wireless equipment include: Global Positioning System (GPS),Telemetry

control and traffic control systems, Professional LMR and

SMR ,Infrared and ultrasonic remote control devices, Cordless computer

peripherals, Cellular telephones and pagers, The Amateur Radio Service

(Ham radio), Consumer and professional Marine VHF radios, etc

Goldsmith, (2005).

1.2 A sensor network

A sensor network is a group of specialized transducers with a

communications infrastructure intended to monitor and record

conditions at diverse locations. Sensor networks are the key for

gathering the data needed by smart environments Young, (1964). A

sensor network is required in the present scenario that is fast and

easy to install and maintain. The individual nodes that constitute a

wireless sensor network are greatly small in size and uses power-

efficient batteries to extend their operational longevity. Every

sensor node is equipped with a transducer, microcomputer, transceiver

and power source. The transducer generates electrical signals based on

sensed physical effects and phenomena.

A WSN is a wireless network consisting of spatially distributed

autonomous devices using sensors to monitor physical or environmental

conditions. A WSN system consolidates a gateway that provides wireless

connectivity back to the wired world and distributed nodes. The

building-up of wireless sensor networks was inspired by military

applications like surveillance in war zones. Today, they consist of

shared independent devices that use sensors to monitor the physical

conditions, for instance vibration, movement and temperature as well

as sound. The WSN is built of nodes from a few to several hundreds or

even thousands, where in each node is connected to one (or sometimes

several) sensors.

Figure 1: Wireless Sensor Networks Wikipedia (1997).

1.2. Typical multi-hop wireless sensor network architecture

WSNs will open the gates to the wireless revolution. In creating a

practical wireless network can be a depressing task unless the

concepts are made simple. In many WSN applications, the deployment of

sensor nodes is performed in an ad hoc model without careful planning

and engineering. Once deployed, the sensor nodes must be able to

autonomously organize themselves into a wireless communication

network. In most cases it is very difficult and even impossible to

change or recharge batteries for the sensor nodes Tao et al, (2010).

However, the new wireless technologies will likewise structure the

society in unpredictable ways. A denial-of-service attack (DoS attack)

or distributed denial-of-service attack (DDoS attack) is an effort in

making a computer resource unavailable to its intended users. Although

the channel to carry out, motives for, and targets of a DoS attack may

vary, it generally consists of the intensive efforts of person or

persons to prevent an Internet site or service from functioning

efficiently temporarily or indefinitely. A denial-of-service attack is

characterized by an explicit attempt by attackers to prevent

legitimate users of a service from using that service. There are two

general forms of DoS attacks: those that crash services and those that

flood services.

Figure 2: Typical multi-hop wireless sensor network architecture Wikipedia (1997) .

This section discusses with different type of attacks in wireless

sensor network: Eitaro et al (2012)

A. Node capture attack: The confidentiality and integrity can be compromised

by physically capture the sensor node and extract the data from their

memory is called Node Capture Attack. This can manage the sensor node

and use for further attacks.

B. Compromised node: The sensor node distributes in a large number of

areas and cannot be monitored. So, the attacker goes into the wireless

network and compromise the sensor node. The attacker can get

cryptographic keys, information and control the sensor node which part

of wireless sensor network.

C. Denial of service (DOS): The Denial of service (DoS) attack tries to convey

unnecessary packets and utilize more network bandwidth. It prevents

the network user from accessing the service or resource which they

need to communicate. The DoS attack could be in Physical layer, link

layer, network layer and transport layer.

Attacks can be channel at any network device, including attacks on

routing devices and web, electronic mail, or Domain Name System

servers. A DoS attack can be perpetrated in many ways. The five basic

types of attack are:

• Disruption of physical network components.

• Disruption of state information, such as unsolicited resetting of

TCP sessions.

• Consumption of computational resources, such as bandwidth, disk

space, or processor time.

• Obstructing the communication media between the intended users and

the victim so that they can no longer communicate adequately.

• Disruption of configuration information, such as routing

information, Misra, et al, (2009).

DoS attack may include execution of malware intended to:

Trigger off errors in the sequencing of instructions, so as to

force the computer into an unstable state or lock-up.

Damage the operating system itself.

Exploit errors in the operating system, causing resource

starvation thrashing available facilities so no real work can

be accomplished.

Maximize usage of processor, preventing any work from occurring.

Trigger off errors in the microcode of the machine, Singal (2014).

Node compromise detection It is a difficult security requirement

for a favorable deployment of large-scale wireless sensor

networks. A node compromise attack often consists of three

stages:

i. The first stage is physically obtaining and compromising the

sensors.

ii. The second stage is redeploying the compromised nodes back to

the sensor network.

iii. The last stage is compromised sensors rejoining the network and

launching attacks

These two attacks are alike in the sense that both procreate black

holes and the areas within which the opponent can either passively

intercept or actively block data delivery.

A conventional cryptography-based security method cannot singly

provide satisfactory solutions to these problems. This is because once

a node is compromised; the adversary can always acquire the secret

keys of that node, and thus can intercept any information passed

through it. At the same time, a rival can always perform certain form

of DOS attack (e.g., jamming) even if it does not have any knowledge

of the crypto-system used in the WSN. One solution to these attacks is

to exploit the network’s routing performance. Specifically, if the

locations of the black holes are known a priori, then information can

be delivered over paths that bypass these holes, whenever possible

typically through a two-step process. First, the packet is broken into

M shares (i.e., components of a packet that carry partial information)

using a ðT; MÞ-threshold secret sharing mechanism such as the Shamir’s

algorithm. The original information can be recovered from a

combination of at least T shares, but no information can be guessed

from less than T shares. Second, multiple routes from the source to

the destination are computed according to some multipath routing

algorithm. The M shares are then distributed over these routes and

delivered to the destination. As long as at least M _ T þ 1 (or T)

shares bypass the compromised (or jammed) nodes, the adversary cannot

acquire (or deny the delivery of) the original packet.

We contend that three security problems subsist in the upon counter

attack approach:

• This approach is no longer valid if the attacker can selectively

compromise or jam nodes. This is because the route computation in

the above multipath routing algorithms is deterministic for a

fixed topology, a fixed set of routes are always computed by the

routing algorithm for given source and destination.

• Secondly, as pointed out in, actually very few node-disjoint

routes can be found when node density is moderate and source and

destination nodes are several hops apart. The lack of enough

routes significantly undermines the security performance of this

multipath approach.

• Finally, even worse, because the set of routes is computed under

certain constraints, the routes may not be spatially dispersive

enough to avoid a moderate-sized black hole.

In this research, we propose a randomized multipath routing algorithm

that can overcome the above issue. In this algorithm, multiple paths

are created in a randomized way whenever a data packet needs to be

sent, such that the set of routes taken by different shares of various

packets keep alternating time to time and a large number of routes can

be potentially created for each source and end. To intercept various

packets, the adversary has to compromise or jam all possible routes

from the source to the destination, which is basically impossible.

Because routes are now randomly generated, they may no longer be node-

disjoint. However, the algorithm ensures that the randomly generated

routes are as dispersive as possible, i.e., the routes are

geographically separated as far as possible such that they have high

likelihood of not simultaneously passing through a black hole.

Considering the stringent constraint on energy consumption in WSNs,

the main challenge in our design is to generate highly dispersive

random routes at low energy cost. As explained later, such a challenge

is not trivial. A naive algorithm of generating random routes, such as

Wanderer scheme (a pure random-walk algorithm), only leads to long

paths containing many hops, and therefore, consuming lots of energy

without achieving good dispersiveness. Due to Security considerations,

we also require that the route computation be implemented in a

distributed way, such that the final route represents the aggregate

decision of all the nodes participating in the route selection. As a

result, a small number of compromised nodes cannot dominate the

selection result. In addition, for efficiency purposes, we also

require that the randomized route selection algorithm only incurs a

small amount of communication overhead, Misra et al,( 2005).

1.4 RELATED WORK

Recently, several works have taken security metrics into account when

constructing (deterministic) multi-path routes. Specifically, the

SPREAD algorithm in attempts to find multiple most-secure and node-

disjoint paths. The security of a path is defined as the likelihood of

node compromise along that path, and is labeled as the weight in path

selection. A modified Dijkstra algorithm is used to iteratively find

the top- K most secure node-disjoint paths. The H-SPREAD algorithm

improves upon SPREAD by simultaneously accounting for both security

and reliability requirements, Lou and Kwon, (2006).

Lee et al., (2007) presents distributed Bound-Control and Lex-Control

algorithms, which compute multiple paths, respectively, in such a way

that the performance degradation (e.g., throughput loss) is minimized

when a single-link attack or a multi-link attack happens. Other

examples of secure deterministic multi-path routing algorithms include

SRP, SecMR, Papadimitratos and Haas, (2002). Existing randomized

multi-path routing algorithms in WSNs have not been designed with

security considerations in mind, largely due to their low energy

efficiency. To the best of our knowledge, the work presented in this

paper fills a void in the area of secure randomized multi-path

routing. Specifically, flooding is the most common randomized multi-

path routing mechanism. As a result, every node in the network

receives the packet and retransmits it once. To reduce unnecessary

retransmissions and improve energy efficiency, the Gossiping algorithm

was proposed as a form of controlled flooding whereby a node

retransmits packets according to a pre-assigned probability. It is

well known that the Gossiping algorithm has a percolation behavior, in

that for a given retransmission probability, either very few nodes

receive the packet, or almost all nodes receive it. Parametric

Gossiping was proposed in to overcome the percolation behavior by

relating a node’s retransmission probability to its hop count from

either the destination or the source. A special form of Gossiping is

the Wanderer algorithm, whereby a node retransmits the packet to one

randomly picked neighbor, Barrett et al, (2003). When used to counter

compromised-node attacks, flooding, Gossiping, and parametric

Gossiping actually help the adversary intercept the packet, because

multiple copies of a secret share are dispersed to many nodes. The

Wanderer algorithm has poor energy performance, because it results in

long paths. In contrast, the NRRP, DRP, and MTRP schemes proposed in

this paper are specifically tailored to security considerations in

energy constrained WSNs. They provide highly dispersive random routes

at low energy cost without generating extra copies of secrete shares.

SYSTEM ANALYSIS Barrett et al, (2003).

1.4.1 EXISTING SYSTEM

SPREAD algorithm in attempts to find multiple most-secure and node-

disjoint paths. The security of a path is defined as the likelihood of

node compromise along that path, and is labeled as the weight in path

selection. A modified Dijkstra algorithm is used to iteratively find

the top- K most secure node-disjoint paths. The H-SPREAD algorithm

improves upon SPREAD by simultaneously accounting for both security

and reliability requirements. Distributed Bound-Control and Lex-

Control algorithms, which computes multiple paths, respectively, in

such a way that the performance degradation (e.g., throughput loss) is

minimized when a single-link attack or a multilink attack happens,

respectively. Flooding is the most common randomized multi-path

routing mechanism. In this regard, every node in the network receives

the packet and retransmits it once. To decrease unnecessary

retransmissions and pick up energy efficiency, the Gossiping algorithm

was propounded as a form of controlled flooding, whereby a node

retransmits packets according to a pre-assigned probability.

Parametric Gossiping was propound to overcome the percolation

character by relating a node’s retransmission probability to its hop

count from either the destination or the source as shown in figure 2.

A special form of Gossiping is the Wanderer algorithm, whereby a node

retransmits the packet to one randomly picked neighbor. When used to

counter compromised node attacks, flooding, Gossiping, and parametric

Gossiping actually help the opponent to intercept or block the packet,

because multiple copies of a secret transmission are dispersed to many

nodes, Karunakaran and Venkatesh, (2012).

According to Motharkar et al (2013) The following are the

disadvantages of existing system

• The Wanderer algorithm has low energy performance, because it

results in long paths.

• Multi-path routing mechanism, Gossiping algorithm has a percolation

behavior, in that for a given retransmission probability, either

very few nodes receive the packet, or almost all nodes receive it.

• Existing randomized multi-path routing algorithms in WSNs have not

been designed with security considerations in mind, largely due to

their poor energy efficiency.

1.4.2 PROPOSED SYSTEM

The proposed solution is to create a randomized multi-path routing

algorithm that can conquer the black holes formed by Compromised-node

and denial-of-service attacks. Instead of choosing paths from a pre-

computed set of routes, our aim is to compute multiple paths in a

randomized form each time a data packet needs to be sent, such that

the set of routes taken by distinct shares of different packets keep

changing over time. To intercept different packets, the intruder has

to compromise or jam all possible routes from the source to the

destination, which is practically infeasible.

According to Motharkar et al (2013) The following are the advantages

of existing system.

• Provides highly dispersive random routes at low energy cost without

generating extra copies of secrete shares.

• If the routing algorithm becomes known to the adversary, the

adversary still cannot pinpoint the routes traversed by each packet

• Energy efficient

Advantages of DDRA Algorithm

Cost is low compare to cryptographic technique.

It’s applicable for wired and wireless networks.

Number of retransmission is less

SYSTEM DESCRIPTION

Steps for Proposed Approach

Enter the number of nodes to form a network.

Enter the node name, IP address and port number for each node.

Enter the maximum possible paths between the nodes to send the

data from source to destination.

Login each node to activate it in the network.

Enter the source and destination node and select the text file

which is to be send.

After selecting the files apply the Randomize Dispersive Routing

algorithm, which breaks the file into multiple packets and as a

result the multiple paths are generated.

Each packet is sent through randomized path and all the packets

reach to the destination successfully.

Data Flow Diagram: Motharkar et al (2013).

1.5 RANDOMIZED MULTIPATH DELIVERY

Randomized multipath delivery proposed by Tao, Liu and karuz ,

(2010), Data delivery mechanism main drawback is black hole attack.

When using multipath routing attacker can easily get the data, so it

avoids multipath routing. If randomly sent the data to the designation

and attacker doesn’t get the data easier. Sensor node sent the data

randomly and can save more energy, Anri et al., (2012). The randomized

multipath delivery is used sent the data securely by using multi-hop

routing. Each node randomly select by neighbor nodes. Purely random

propagation is mainly based on one –hop neighbor if sensor node sent

the information from the source to designation and mainly based on

neighbor list and all sensor nodes ID when sensor node sent the

information to the sink node based on TTL values. In considering the

three-phase approach for secure data delivery in a WSN as shown below

• Secret sharing of information,

• Randomized propagation of each information share, and

• Normal routing (e.g., min-hop routing) toward the sink.

Figure 4: Randomized dispersive routing in a WSN. (EXTRACTED FROM

www.secs.oakland.edu) .

The effect of route dispersiveness on bypassing black holes is

illustrated in Fig.4, where the dotted circles represent the ranges

the secret shares can be propagated to in the random propagation

phase. A larger dotted circle implies that the resulting routes are

geographically more dispersive. It is clear that the routes of higher

dispersiveness are more capable of avoiding the black hole.

1.5 Randomized Dispersive Routing Algorithm Formula

M – T + 1

Where,

M= Multiple routes from the source to the destination are computed

according randomized routing algorithm.

T = Original information can be recovered from a combination of at

least T shares.

More specifically, when a sensor node wants to send a packet to the

sink, it first breaks the packet into M shares, according to a (T, M)

-threshold secret sharing algorithm. Each share is then transmitted to

some randomly selected neighbor. That neighbor will continue to relay

the share it has received to other randomly selected neighbors, and so

on. In each share, there is a TTL field, whose initial value is set by

the source node to control the total number of random relays. After

each relay, the TTL field is reduced by 1. When the TTL (Time to live)

value reaches 0, the last node to receive this share begins to route

it toward the sink using min-hop routing. Once the sink collects at

least T shares, it can reconstruct the original packet. No information

can be recovered from less than T shares.

Figure 5: Implication of route depressiveness on

bypassing the black hole. (Extracted from www.secs.oakland.edu).

(a) Routes of higher depressiveness. (b) Routes of lower

depressiveness.

The upshot of route depressiveness on bypassing black holes is

illustrated in the above figure. A larger dotted circle implies that

the resulting routes are geographically more dispersive. Comparing the

two cases in the above Figure, it is clear that the routes of higher

depressiveness are more capable of avoiding the black hole. Clearly,

the random propagation phase is the key component that dictates the

security and energy performance of the entire mechanism.

1.6 Random Propagation of Information Shares

To diversify routes, an ideal random propagation mechanism or

algorithm that would propagate shares depressively as much as

possible. Typically, this means propagating the shares farther from

their source and towards the sink. At the same time, it is highly

desirable to have an energy-efficient propagation, which calls for

limiting the number of randomly propagated hops. Now the challenge

here lies in the random and distributed nature of the propagation i.e.

a share may be sent one hop farther from its source in a given step,

but may be sent back closer to the source in the next step, wasting

both steps from a security point of view. To tackle this issue, some

control needs to be imposed on the random propagation process.

Generally we have four types of schemes:

Multicast Tree-Assisted Random Propagation

Directed Random Propagation

Non- repetitive Random Propagation

Purely Random Propagation (Baseline Scheme)

The random routes generated by the four algorithms are not necessarily

node disjoint. Note that the security analysis for the CN and DOS

attacks is similar because both of them involve calculating the packet

interception probability. For brevity, we only focus on the CN attack

model. The same treatment can be applied to the DOS attack with a

straightforward modification. Basically this paper involves three

important steps for implementing secure data transmission/collection

in WSN’s using some programming language like java and database like

ORACLE is as follows which include three modules:

o Topology Construction

o Randomized multipath routing

o Message Transmission

1.7 Topology Construction

In this module, we construct a topology structure. Here we use mesh

topology because of its unstructured nature. Topology is constructed

by getting the names of the nodes and the connections among the nodes

as input from the user. While getting each of the nodes, their

associated port and IP address is also obtained. For successive nodes,

the node to which it should be connected is also accepted from the

user. While adding nodes, comparison will be done so that there would

be no node duplication. Then we identify the source and the

destinations.

1.8 Randomized Multipath Routing

We achieve randomized multipath routing that can conquer the

Compromised Node attack & Denial of Service attack. Here several paths

are computed in a randomized pattern each time an information packet

needs to be sent. In this context a large number of routes can be

potentially produce for each source and destination as shown in figure

6. To capture different packets, the offender need to compromise and

squash all possible routes from the source to the destination, which

is practically not possible.

Figure 6: Randomized Multipath Routing Burmester, and Le (2004)

C. Message Transmission

Here we transmit the message from source to destination. For each

transmission we choose a random path, in that only the packet is

transmitted. Pure Random Propagation (PRP): Shares are propagated based on

one-hop neighborhood information. Particularly, a sensor node

conserves a neighbor list, which contains the identities of all nodes

within its transmission range. When a source node wants to send data

to destination, it contains a TTL of initial value N in each share. It

then randomly picks a neighbor for each share, and unicasts the share

to that neighbor. After receiving the share, the neighbor first

mandates the TTL. If the new TTL is greater than 0, the neighbor

randomly picks a node from its neighbor list (this node cannot be the

source node) and relays the share to it, and so on. When the TTL

reaches 0, the final node receiving this share stops the random

propagation of this share, and starts routing it toward the sink using

normal min-hop routing.

Secured Delivery of Packets: In this module we can maintain the routing

table; here we add one more column to maintain the packet delivery

ratio. In this way we can maintain how many packets are transmitted

over each path. It will be useful to identify any path and can packets

handle packets number. We can stop transmission for some amount of

time period over that path, so that the hacker cannot identify in

which path the message is transmitted and also we can easily transmit

the data securely.

1.8 RESULT ANALYSIS

The original file will be split into Multiple Packets and transmitted

on multipath by using Randomized Dispersive Routing Algorithm formula

(M – T + 1).It also gives the Acknowledgement to the sender and the

receiver that the data is been transmitted in fully secure form and

it is Confidential to only that authorized party anyways. According to

this Algorithm, description is given in a way that tell us data is

fully transmitted and acknowledgment send to sender and receiver.

WHEN 1ST PACKET TRANSFERRED THEN T=5 M=0

M-T+1 = 0-5+1 = - 4 MEANS 4 PACKET YET TO BE RECEIVED

WHEN 2ND PACKET TRANSFERRED THEN T=5 M=1

M-T+1 = 1-5+1 = - 3 MEANS 3 PACKET YET TO BE RECEIVED

WHEN 3RD PACKET TRANSFERRED THEN T=5 M=2

M-T+1 = 2-5+1 = - 2 MEANS 2 PACKET YET TO BE RECEIVED

WHEN 4TH PACKET TRANSFERRED THEN T=5 M=3

M-T+1 = 3-5+1 = - 1 MEANS 1 PACKET YET TO BE RECEIVED

WHEN 5TH PACKET TRANSFERRED THEN T=5 M=4

M-T+1 = 4-5+1 = 0 MEANS ALL PACKET RECEIVED.

The proposed algorithm is easy to implement and compatible with

popular routing protocols, such as RIP and others. This proposed

algorithm is completely orthogonal to the work based on the designs of

cryptography algorithms and system infrastructures. Security enhanced

dynamic routing could be used with cryptography-based system designs

to further improve the security of data transmission over networks.

1.9 CONTRIBUTION TO KNOWLEDGE IN THE DEVELOPMENT OF RANDOMIZED ROUTES

FOR IMPROVING SECURITY IN DATA COLLECTION IN WIRELESS SENSOR NETWORK

This paper depicts the effectiveness of the randomized dispersive

routing in overcoming the CN and DOS attacks which is energy

efficient. By appropriately setting the secret sharing and propagation

parameters, the packet interception probability can be easily reduced

by the proposed algorithms to a better extent. Improved security

performance comes at a reasonable cost of energy. The energy

consumption of the projected randomized multipath routing algorithms

is only one to two times higher than that of their deterministic

complement algorithms. The proposed algorithms can be applied to

selective packets in WSNs to create supplementary security levels

against adversaries attacking to acquire these packets. Considering

that the percentage of packets in a WSN that require a high security

level is small, we are convinced that the selective employ of the

proposed algorithms does not significantly impact the energy

efficiency of the entire system. Thus the route generated are highly

dispersive, secure and energy efficient. The paper resolution requires

that my co-researcher can extend the mechanisms further.

CONCLUSION we are presenting this paper in order to conquer the ‘blackholes’ that are formed due to

compromised-node (CN) and denial-of-service (DoS) by using some routing mechanisms

approach. We define attack and establish taxonomy of this attack by

distinguishing different attack types. The definition and taxonomy are

very important in understanding and analyzing the threat the proposed

algorithms can be applied to selective packets in WSNs to create

supplementary security levels against adversaries attacking to acquire

these packets. Considering that the percentage of packets in a WSN

that require a high security level is small, we are convinced that the

selective employ of the proposed algorithms does not significantly

impact the energy efficiency of the entire system.

.

REFERENCES

Akyildiz, I. F., Su. W., Sankarasubramaniam. Y. and Cayirci. E.

(2002) A survey on sensor networks‘, IEEE

Communications Magazine, 40(8):102–114.

Ali M, (2010) "Secure Multipath Routing Protocols in Wireless Sensor

Networks: A Security Survey

Analysis", Second International Conference on Network

Applications, Protocols and Services.

Anri K, Eitaro K, and Yoshiaki, K, (2012) “Security and Dependability

Enhancement of Wireless Sensor

Networks with Multipath Routing Utilizing the Connectedness of

Joint Nodes,” 32nd International

Conference on Distributed Computing Systems Workshops.

Burmester. M. and Le. T. V. (2004) Secure multipath communication in

mobile adhoc networks‘, In

Proceedings of the International Conference on Information Technology: Coding

and Computing,

pages 405–409.

Barreth, C. L. , Eidenbenz, S. J. (2003), Parametric probability

sensor network routing. In proceedings of

the AMC international conference on wireless sensor network

and applications pg. 112 – 131.

Claveirole. T., de Amorim. M. D., Abdalla. M. and Viniotis. Y. (2008)

Securing wireless sensor networks

against aggregator compromises‘, IEEE Communications Magazine, pg

134–141.

Johnson. D.B., Maltz D.A., and Broch J, (2001) “DSR: The Dynamic

Source Routing Protocol for Multihop

Wireless Ad Hoc Networks,” Ad Hoc Networking,Karunakaran P, Venkatesh C. (2012) Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network. Lee. P. C., Misra. V. and Rubenstein. D. (2005) Distributed

algorithms for secure multipath routing‘, In

Proceedings of the IEEE INFOCOM Conference, pages 1952-1963.

Li. X. Y., Moaveninejad. K. and Frieder. O. (2005) Regional gossip

routing wireless ad hoc networks‘,

ACM Journal of Mobile Networks and Applications, 10 (1-2):61–77.

Lee P.C, Misra. V, and Rubenstein D, (2007) “Distributed Algorithms

for Secure Multipath Routing in

Attack-Resistant Networks,” IEEE/ ACM. Networking.

Li . X.Y, Moaveninejad . K, and Frieder O, (2005) “Regional Gossip

Routing Wireless Ad Hoc Networks,”

ACM J. Mobile Networks and Applications, vol. 10, nos. 1-2,

pp. 61-77.

Papadimitratos P. and Haas Z. J. (2002) Secure routing for mobile ad

hoc networks. In Proceedings of

SCS Communication Networks and Distributed Systems Modeling and Simulation

Conference (CNDS)

Poor. H, (1985) An Introduction to Signal Detection and Estimation. New York:

Springer- Verlag.

Poornima A.S; Amberker, B.B, (2011) “Secure data collection using

mobile data collection in clustered

Wireless sensor networks”, IEEE Communication networking &

pages 85-95.

Rasheed A , mahapatra.R. (2008) “Secure data collection scheme in

wireless sensor network with

Mobile sink”, IEEE international symposium on network

computing and applications, pages 332-340.

Misra S. et al. (eds.) E. H. Miller, “A note on reflector arrays

(Periodical style—Accepted for

Publication),” IEEE Trans. Antennas Propagat., to be published.

Shio Kumar Singh et al. (2011), Routing protocols in wireless sensor

network. A survey international

Journal of computer science and engineering survey, vol 1, No.

2 pg 63 – 83.

Tao Shu, Marwan Krunz and Sisi Liu, (2010), Department of Electrical

and Computer Engineering

University of Arizona. Secure data collection in wireless

sensor network‘.

T. Claveirole, M.D. de Amorim, M. Abdalla, and Y. Viniotis, (2008)

“Securing Wireless Sensor Networks

Against Aggregator Compromises,” IEEE Comm. Magazine, vol.46,

no. 4, pp. 134-141.

Wenjing lou; Youngoo kwon, (2006) “H-spread: a hybrid multipath scheme

for secure

And reliable data collection in wireless sensor Networks”, IEEE

transcations on vechicular

technology, pages 1320-1330.

www.secs.oakland.edu

Young G. O. (1964) “Synthetic structure of industrial plastics (Book

style with paper title and editor),”

in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-

Hill, pp. 15–64.