11 research outputs found

    SALR: Secure adaptive load-balancing routing in service oriented wireless sensor networks

    Get PDF
    Congestion control and secure data transfer are the major factors that enhance the efficiency of Service Oriented Wireless Sensor Networks. It is desirable to modify the routing and security schemes adaptively in order to respond effectively to the rapidly changing Network State. Adding more complexities to the routing and security schemes increases the end-to-end delay which is not acceptable in Service Oriented WSNs which are mostly in real time. We propose an algorithm Secure Adaptive Load-Balancing Routing (SALR) protocol, in which the routing decision is taken at every hop considering the unforeseen changes in the network. Multipath selection based on Node Strength is done at every hop to decide the most secure and least congested route. The system predicts the best route rather than running the congestion detection and security schemes repeatedly. Simulation results show that security and latency performance is better than reported protocols

    DRFSD: Directed Restricted Flooding For Secure Data-Aggregation In Wireless Sensor Networks

    Get PDF
    Secured Data Transmission is a major issue in Wireless Sensor Networks (WSNs). In this paper we have proposed Directed Restricted Flooding Protocol (DRFSD) in WSNs. This protocol is better than H-SPREAD (Hybrid Security Protocol for REliable dAta Delivery). In DRFSD, alternate multipaths are selected based on the sensor node, that are placed at 180? direction with the Base Station (BS). This scheme is ef?cient in sending the Data Packets to the Base Station in shorter duration than the H-SPREAD. Simulation Results show that our algorithm approach performs well with respect to latency in comparison with earlier algorithm

    SEAD: source encrypted authentic data for wireless sensor networks

    Get PDF
    One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms

    SSEGR: Secure single-copy energy efficient geographical routing algorithm in wireless sensor networks

    Get PDF
    Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems (GPS). This helps to easily detect the position of their neighboring nodes. The power consumption is more in the existing routing algorithms, since the nodes build the routing tables and the neighboring node IDs are determined by searching the routing table. In this paper, we have proposed Secure Single-Copy Energy Efficient Geographical Routing (SSEGR) algorithm in which the data traffic and energy consumption is minimized using single copy data transfer. In SSEGR, initially one copy is transmitted to the next node using greedy approach and another copy is preserved in the sending station. If acknowledgment is not received even after timeout then the second copy is transmitted. This dynamic single copy scheme reduces the data traffic in Wireless Sensor Networks. Security algorithms are incorporated in every sensor node to prevent any malicious node attack that disturb the normal functioning of the network. Simulation result shows that the performance of the proposed algorithm is better interms of packet delivery probability and energy consumption in comparision with existing algorithm

    Anticholinesterase and Antioxidant Activities of Spilanthes filicaulis Whole Plant Extracts for the Management of Alzheimer’s Disease

    Get PDF
    Background: Spilanthes filicaulis is a tropical herb implicated as a memory enhancer in ethnomedicine. Objective: The study investigated acetyl/butyryl cholinesterase inhibitory and antioxidant activities of different extracts of S. filicaulis whole plant and correlated them to its phytochemical constituents. Methods: The powdered whole plant was successively extracted with n-hexane, ethyl acetate and methanol. Acetyl cholinesterase (AChE) and Butyryl cholinesterase (BuChE) inhibitory activity were evaluated by Ellman colorimetry assay. Antioxidant activity was tested using 1, 1-diphenyl-2-picrylhydrazyl (DPPH) radical scavenging, ferric reducing power and nitric oxide scavenging assays. Total phenolic, flavonoid and tannin were estimated using standard methods. Correlation was determined using Quest Graph™ Regression Calculator. Results: Various extracts exhibited concentration-dependent AChE and BuChE inhibitory activity with ethyl acetate extract being the highest with IC50 of 0.77 μg/mL and 0.92 μg/mL for AChE and BuChE respectively. The ethyl acetate extract also showed the highest reducing power when compared with the other extracts. The methanol extract had slightly higher phenolic and flavonoid content and showed the highest DPPH radical scavenging effect. DPPH scavenging, AChE and BuChE inhibition had high correlation with the total flavonoid content with R2 values of 1.00, 0.800 and 0.992 respectively while nitric oxide scavenging had high correlation with phenolics and tannins with R2 = 0.942 and 0.806 respectively. Conclusion: These results show that the extracts of the whole plant of S. filicaulis possess significant AChE/BuChE inhibitory and antioxidant properties, mostly due to its flavonoid content, suggesting the possible use of the plant in neurodegenerative diseases such as AD

    SEAD: Source Encyrpted Authentic Data for Wireless Sensor Networks

    No full text
    One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms

    Secure Multiple Domain Routing for Wireless Sensor Networks

    No full text
    Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain Routing with Overlap of Nodes (MDRON) and Multiple Domain Routing Without Overlap of Nodes (MDRWON) algorithms, in which packets follow multiple optimized paths simultaneously. The Special node algorithm searches the node which has maximum power and these nodes are used for transferring the packet from one domain to another domain. Simulation results using MATLAB shows that performance is better than Purely Random Propagation (PRP) and Non Repetitive Random Propagation(NRRP) Algorithms

    SGR: Secure geographical routing in Wireless Sensor Networks

    No full text
    Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems(GPS). This helps to easily detect the position of their neighboring nodes. The power consumption is more in the existing routing algorithms, since the nodes build the routing tables and the neighboring node IDs are determined by searching the routing table. In this paper, we have proposed Secure Geographical Routing (SGR) algorithm in which the data traffic and energy consumption is minimized using single copy data transfer. In SGR, initially one copy is transmitted to the next node using greedy approach and another copy is preserved in the sending station. If acknowledgment is not received even after timeout then the second copy is transmitted. This dynamic single copy scheme reduces the data traffic in Wireless Sensor Networks. Security algorithms are incorporated in every sensor node to prevent any malicious node attack that disturb the normal functioning of the network. Simulation result shows that the performance of the proposed algorithm is better in terms of packet delivery probability and energy consumption in comparison with existing algorithms. © 2014 IEEE

    DSWSD: Double Sliding Window for Secure Data Transmission in Wireless Sensor Networks

    No full text
    Synchronized secure and reliable data transfer without explicit transfer of control messages known as loose source synchronization is essential in Wireless Sensor Networks.In Secure Source-Based Loose Synchronization (SOBAS) protocol there is a possibility of interpreting the accurate data as malicious. To overcome this problem, we have introduced Double Sliding Window for Secure Data Transmission (DSWSD) algorithm in which Double window concept is used to detect malicious data accurately. Simulation results shows that, DSWSD performance is better and energy consumption is reduced in comparison with earlier works. Keywords- Double Window, False Positive Rate, Synchronization, Wireless Sensor Networks
    corecore