ijct
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • conference
  • Submission
  • IRG Journals
  • Contact Us

ijct Submit Your Article : editorijctjournal@gmail.com

international journal of computer techniques(ijct)

Paper Title : DISCRIMINATIVE ATHENDICATION BASED OPPERTUNISTIC ROUTING IN WIRELESS SENSOR NETWORK WITH TRUSTWORTHY PATH MECHANISM

ISSN : 2394-2231
Year of Publication : 2021

10.29126/23942231/IJCT-v8i2p18
Authors: K.E.Eswari MCA., M.Phil., M.E,, K.Indhu

         



MLA Style: K.E.Eswari MCA., M.Phil., M.E,, K.Indhu "DISCRIMINATIVE ATHENDICATION BASED OPPERTUNISTIC ROUTING IN WIRELESS SENSOR NETWORK WITH TRUSTWORTHY PATH MECHANISM " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

APA Style: K.E.Eswari MCA., M.Phil., M.E,, K.Indhu "DISCRIMINATIVE ATHENDICATION BASED OPPERTUNISTIC ROUTING IN WIRELESS SENSOR NETWORK WITH TRUSTWORTHY PATH MECHANISM " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

Abstract
Wireless Sensor Networks (WSNs) are widely used because the communication system within the Internet of Things (IoT). In addition to the services provided by WSNs, many IoT-based applications require reliable data delivery over unstable wireless links. To guarantee reliable data delivery, existing works exploit geographic opportunistic routing with multiple candidate forwarders in WSNs. However, these approaches suffer from serious Denial of Service (DoS) attacks, where a large number of invalid data are deliberately delivered to receivers to disrupt the traditional operations of WSNs. In this paper, we propose a selective authentication-based geographic opportunistic routing (SelGOR) to defend against the DoS attacks, meeting the requirements of authenticity and reliability in WSNs. By analyzing statistic state information (SSI) of wireless links, SelGOR leverages an SSI-based trust model to improve the efficiency of data delivery. Unlike previous opportunistic routing protocols, SelGOR ensures data integrity by developing an entropy-based selective authentication algorithm, and is in a position to isolate DoS attackers and reduce the computational cost. Specically, we design a distributed cooperative verication scheme to accelerate the isolation of attackers. This scheme also makes SelGOR avoid duplicate data transmission and redundant signature verication resulting from opportunistic routing. The extensive simulations show that SelGOR provides reliable and authentic data delivery, while it only consumes 50% of the computational cost compared to other related solutions.

Reference
[1] L Atzori, A Iera, and G Morabito, “The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, Oct. 2010. [2] J. Gubbi, R. Buyya, S. Marusic, and M.Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29, no. 7, pp. 1645-1660, 2013. [3] L. D. Xu, W. He, and S. Li, “Internet of Things in industries: A survey," IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233- 2243, Nov. 2014. [4] R. H. Weber, “Internet of Things-New security and privacy challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, Jan. 2010. [5] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: A survey," IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, Dec. 2004. [6] E. Felemban, C. G. Lee, and E. Ekici, “MMSPEED: Multipath multi-speed protocol for qos guarantee of reliability and timeliness in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 738-754, Jun. 2006. [7] S. Li, R. K. Neelisetti, C. Liu, and A. Lim, “ Efficient multi-path protocol for wireless sensor networks," International Journal of Wireless and Mobile Networks, vol. 2, no. 1, pp. 110-130, 2010. [8] X. Huang and Y. Fang, “Multiconstrained qos multipath routing in wireless sensor networks," Wireless Networks, vol. 14, no. 4, pp. 465-478, 2008. [9] G. Schaefer , F. Ingelrest, M. Vetterli, “Potentials of opportunistic routing in energyconstrained wireless sensor networks," in Proceedings of the 6th European Conference onWireless Sensor Networks, February 11-13, 2009, Cork, Ireland. [10] R. Sanchez-Iborra and M. Cano, “JOKER: A novel opportunistic routing protocol," ," IEEE Journal on Selected Areas in Communications, vol. 34, no. 5, pp.1690-1703, May 2016. [11] J. Luo, J. Hu, D.Wu, and R. Li, “Opportunistic routing algorithm for relay node selection in wireless sensor networks," IEEE Trans. Ind. Informat., vol. 11, no. 1, pp. 112-121, Feb. 2015

Keywords
———Internet of Things, opportunistic routing, DoS attacks, selective authentication

IJCT Management

  • Home
  • Aim & Scope
  • Indexing
  • Author instruction
  • Call for paper IJCT JOURNAL
  • Current Issues
  • special issue
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright Infringement
  • Join as a Reviewer
  • FAQ
  • Downloads

  • CopyrightForm
  • Paper Template
  • IJCT Policy

  • Terms & Conditions
  • Cancellation & Refund
  • Privacy Policy
  • Shipping &Delivery
  • Publication Rights
  • Plagiarism Policy
Copyright ©2015 IJCT- International Journal of Computer Techniques Published By International Research Group , All rights reserved

This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)