103 research outputs found

    A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

    Full text link
    This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, we propose a solution to secure GPSR packet by adding a digital signature based on symmetric cryptography generated using the AES algorithm and the MD5 hash function more suited to a mobile environment

    Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

    Full text link
    The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack, Sybil attack, selective forwarding attacks etc. in this paper we will concentrate on selective forwarding attacks In selective forwarding attacks, malicious nodes behave like normal nodes and selectively drop packets. The selection of dropping nodes may be random. Identifying such attacks is very difficult and sometimes impossible. In this paper we have listed up some detection techniques, which have been proposed by different researcher in recent years, there we also have tabular representation of qualitative analysis of detection techniquesComment: 6 Page

    Effective Multicast Routing Protocol for Ad Hoc Networks

    Get PDF
    Most of the multicast routing protocols depend on creation of multicast tree for the transmission of packet from source to destination, which leads to maintain states of the neighboring node and it incures more cost. Maintaining the states of nodes also increases communication and processing overhead as well as requires more amount of memory. Almost all protocols maintain the path list in their routing table which also increases overhead while routing the packets. In this paper we developed a stateless receiver-based multicast routing protocol that includes a list of the multicast destination members addresses (sinks), added in packet headers, to enable receivers to decide the best way to forward the multicast traffic

    A Study of Geocast Routing Protocols in Vehicular Ad-Hoc Network (VANET)

    Get PDF
    Geocast routing has been comprehensively investigated for consistent and well-organized spreading of information due to growing number of Intelligent Transportation System (ITS) applications favouring geocasting. Freshly, different geocast routing protocol have been developed in vehicular ad-hoc network (VANET). In this paper, a qualitative survey of recent geocast routing protocols and some specific future research issues in geocast routing have been provided. A practical and qualitative explanation of each considered protocols have been presented. All the considered protocols have been relatively characterized. This relative study leads us towards some future research challenges in geocast routing. DOI: 10.17762/ijritcc2321-8169.150519

    Gafor : Genetic algorithm based fuzzy optimized re-clustering in wireless sensor networks

    Get PDF
    Acknowledgments: The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing. Funding: This research was funded by King Saud University in 2020.Peer reviewedPublisher PD

    Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links

    Get PDF
    © 2018 Elsevier Ltd. This paper presents a cross-layer communication protocol for Wireless Sensor Network (WSN) enabled surveillance system for sensitive fenced areas, e.g., nuclear/oil site. Initially, the proposed protocol identifies the boundary nodes of the deployed WSN to be used as sentinel nodes, i.e., nodes that are always in active state. The remaining nodes are used as duty-cycled relay nodes during the data communication phase. The boundary nodes identification process and data routing are both performed using an enhanced version of the Greedy Perimeter Stateless Routing (GPSR) protocol, which relies on a Non Unit Disk Graph (N-UDG) and referred to as GPSR over Symmetrical Links (GPSR-SL). Both greedy and perimeter modes of GPSR-SL forward data through symmetrical links only. Moreover, we apply the Mutual Witness (MW) fix to the Gabriel Graph (GG) planarization, to enable a correct perimeter routing on a N-UDG. Simulation results show that the proposed protocol achieves higher packet delive ry ratio by up to 3.63%, energy efficiency and satisfactory latency when compared to the same protocol based on the original GPSR

    An Energy-Efficient Secure Scheme in Wireless Sensor Networks

    Get PDF
    We propose an energy-efficient security scheme in wireless sensor networks. The proposed scheme converts sensing data using TinyMD5, which is a variation of MD5, a one-way hash function, and can solve the collision problem of hash value that occurs when MD5 is modified. In addition, it strengthens security capabilities by transmitting data through multiple paths after conversion with TinyMD5 and divides the data to make decryption of the original data difficult. To show the superiority of the proposed algorithm, we compare it with the existing schemes through simulations. The performance evaluation results show that the proposed scheme maintains security better than the existing scheme, improving the communication cost and the network lifetime
    • …
    corecore