Your SlideShare is downloading. ×
Secure and energy efficient disjoint multi-path
Secure and energy efficient disjoint multi-path
Secure and energy efficient disjoint multi-path
Secure and energy efficient disjoint multi-path
Secure and energy efficient disjoint multi-path
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Secure and energy efficient disjoint multi-path


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNsAbstract—Recent advances in micro-electro-mechanical systems (MEMS) technology haveboosted the deployment of wireless sensor networks (WSNs). Limited by energystorage capability of sensor nodes, it is crucial to jointly consider security andenergy efficiency in data collection of WSNs. Disjoint multi-path routing schemewith secret sharing is widely recognized as one of the effective routing strategies toensure the safety of information. This kind of scheme transforms each packet intoseveral shares to enhance the security of transmission. However, in many-to-oneWSNs, shares have a high probability to traverse through the same link and to beintercepted by adversaries. In this paper, we formulate secret sharing based multi-path routing problem as an optimization problem. Our objective aims atmaximizing both network security and lifetime, subject to the energy constraints.To this end, a three-phase disjoint routing scheme, called Security and Energy-efficient Disjoint Route (SEDR), is proposed. Based on secret sharing algorithm,the SEDR scheme dispersively and randomly delivers shares all over the networkin the first two phases, and then transmits these shares to the sink node.Reasons for the proposal :Black hole attack is one of attacks that adversaries may choose to interfereinformation delivery. In some cases, adversaries may have mobility to increase thenumber of black holes for achieving a high packet interception probability.Generally, compromised node (CN) and denial of service (DOS) attacks are twokinds of common black hole attack . In CN attack, adversaries try to compromise a
  • 2. subset of nodes to passively intercept the packets traverse through these nodes. InDOS attack, adversaries actively disrupt, change or even paralyze thefunctionalities of a subset nodes, such that the normal operations of WSNs can notbe executed.hance a routing scheme is required for thwarting such Black Holeattacks.Existing system :To improve network security for WSNs, multi-path routing strategies have becomea hot topic. It can generally be classified into two categories: 1) packets delivery,which directly transmits packets by various paths and 2) shares delivery, i.e.,transforming each packet into shares, then forwarding shares along different routes. Packets delivery mainly focuses on discovering node-disjoint or edge-disjointpaths for transmission, thus it can enhance the security and robustness of networks.In the Split Multiple Routing (SMR) protocol was proposed to establish twomaximally disjoint routes by flooding the ROUTE REQUEST (RREQ) message tothe entire network. In the security of sensor network routing protocols wasanalyzed, and it was found that multi-path routing strategies are one of theeffective countermeasure for the selective forwarding attack.In a Multi Dataflow Topologies (MDT) method was designed to counter theselective forwarding attack by dividing the sensor nodes into two-dataflowtopologies. However, packets delivery duplicates the transmissions, which maylead to high energy consumption. Normally, shares delivery uses secret sharing toenhance the security of packet transmission. Based on a secret sharing algorithmthe adversary can not decode the packet without intercepting a required number ofshares. Therefore, the security performance of the network is improved. Moreover,as there is no need to duplicate packet transmissions, shares delivery cansignificantly relieve the energy consumption of networks. based on a distributed N-
  • 3. to-1 multi-path discovery protocol and secret sharing,hybrid multi-path scheme (H-SPREAD) was designed to improve both the security and reliability of wirelesssensor networks. a Secure Message Transmission (SMT) mechanism was proposedto continuously evaluate the performance of each route, then routing of subsequentshares is determined according to the rating of routes. These works focus ondeterministic multi-path routing strategies, i.e., the route computation is notchanged under the same topology. With random multi-path routing protocolsshares delivery can further strengthen and guarantee the security of packettransmission, even if adversaries acquire the routing strategy. In [19], amathematical framework was presented for analyzing random routing protocols. isthe closest past literature to ours. Four propagation schemes were proposed todispersively deliver the shares of packets, such that the packet interceptionprobability can be guaranteed.Demerits of Existing system :However, most previous works do not consider the network lifetime, which is oneof the critical issues in WSNs.
  • 4. Proposed system :In this paper, we try to maximize both the network security and lifetime byexploiting an effective randomly disjoint multi-path routing scheme with secretsharing. The main contributions of this paper are three-fold:We formulate the secret sharing based disjoint multipath routing problem as anoptimization problem. Our objective is to deliver sliced packet shares alongrandomly generated disjoint paths by routing scheme, such that both the networksecurity and lifetime can be maximized.By jointly considering the network security and lifetime, we propose a three-phaserouting scheme, called Security and Energy-efficient Disjoint Route (SEDR).
  • 5. Firstly, packets are sliced into shares by threshold secret sharing algorithm, andour proposed SEDR scheme disperses these shares in a certain region aroundsource node. Secondly, shares are randomly forwarded along identical-hop routesall over the whole network. Finally, the SEDR algorithm transmits shares to sinkby using least-hop routing.