IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 2 - Issue 5, May 2014 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Identification Of Packet Droppers And Effective Routing Of Packets In Wireless Sensor Networks

[Full Text]

 

AUTHOR(S)

Achuthan Gandhi G, G. Vijayalakshmi

 

KEYWORDS

Keywords: WSN, Packet Droppers, Re-Routing.

 

ABSTRACT

ABSTRACT: In the wireless sensor networks there is the chance for the packets to be dropped due the attacker at the intermediate nodes. The packet droppers are being identified. The packets are routed from source node to the destination by AODV Routing protocol. Some of the intermediate nodes may act as the packet dropper. This is because the third party may change the characteristics of the nodes. The type of attack that we are going to consider here is the worm-hole attack. The droppers are identified by our system. The packets are then routed in the alternative path avoiding those packet droppers.

 

REFERENCES

[1]. I. Khalil and S. Bagchi, “MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. Netowrks (SecureComm ’08), 2008.

[2]. Redundancy in Network Traffic: Findings and Implications Ashok Anand1_, Chitra Muthukrishnan_, Aditya Akella_ and Ramachandran Ramjee†_University of Wisconsin-Madison, †Microsoft Research India{ashok,chitra,akella}@cs.wisc.edu, ramjee@microsoft.com

[3]. R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, “Secmr—A Secure Multipath Routing Protocol for Ad Hoc Networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 87-99, 2007

[4]. S. Lee and Y. Choi, “A Resilient Packet-Forwarding Scheme against Maliciously Packet-Dropping Nodes in Sensor Networks,” Proc. Fourth ACM Workshop on Security of Ad Hoc and

[5]. V. Bhuse, A. Gupta, and L. Lilien, “DPDSN: Detection of Packet-Dropping Attacks for Wireless Sensor Networks,” Proc. Fourth Trusted Internet Workshop, 2005

[6]. Z. Yu and Y. Guan, “A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks,” Proc. IEEE INFOCOM, 2006

[7]. Algorithms and Protocols for Wireless Sensor Networks (http://books.google.co.in/books)

[8]. Algorithms for Routing Lookups and Packet Classification (A Dissertation submitted to The Department Of Computer Science and The Committee on graduate studies of Stanford University in partial fulfillment of the requirements for the degree Of Doctor Of Philosophy Pankaj Gupta) December 2000

[9]. Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad hoc Networks, Thaier Hayajneh, Prashant Krishnamurthy, David(www.sis.pitt.edu/~dtipper/Apaper2009_1.pdf)