Open Access   Article Go Back

Node Attestation for Reliable Communication in WSN

Ranjit Kaur1 , Khushboo Bansal2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-6 , Page no. 16-20, Jun-2016

Online published on Jul 01, 2016

Copyright © Ranjit Kaur , Khushboo Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ranjit Kaur , Khushboo Bansal , “Node Attestation for Reliable Communication in WSN,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.16-20, 2016.

MLA Style Citation: Ranjit Kaur , Khushboo Bansal "Node Attestation for Reliable Communication in WSN." International Journal of Computer Sciences and Engineering 4.6 (2016): 16-20.

APA Style Citation: Ranjit Kaur , Khushboo Bansal , (2016). Node Attestation for Reliable Communication in WSN. International Journal of Computer Sciences and Engineering, 4(6), 16-20.

BibTex Style Citation:
@article{Kaur_2016,
author = {Ranjit Kaur , Khushboo Bansal },
title = {Node Attestation for Reliable Communication in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {16-20},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=959},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=959
TI - Node Attestation for Reliable Communication in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Ranjit Kaur , Khushboo Bansal
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 16-20
IS - 6
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1782 1547 downloads 1568 downloads
  
  
           

Abstract

A wireless sensor network is a group of specialized transducers with a communications infrastructure for monitoring and recording conditions at diverse locations. In this paper various approaches were described that were used for WSN. Leach is used in wireless sensor network and multi-hop leach protocol is used for energy consumed in a single hop for defining energy consumed in a single hop .By receiving various protocols the conclusion occur that leach is best protocol for WSN.

Key-Words / Index Term

Routing Strategy, Attestation Algorithm, Nodes

References

[1] Xinyu Jin “Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN” IEEE Globecom Workshops, pp.2059 – 2064,2010.
[2] Tamer AbuHmed “Software-Based Remote Code Attestation in Wireless Sensor Network” IEEE Global Telecommunications Conference, pp. 1 – 8, 2009.
[3] Po-Hung Yang “Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents” IEEE ,pp. 82 – 89,2015.
[4] Ahmad Salehi S. “Detection of Sinkhole Attack in Wireless Sensor Networks”, IEEE International Conference on Space Science and Communication, 2013, pp. 361-365.
[5] A. Vijayalakshmi., “Mobile Agent Middleware Security for Wireless Sensor Networks” IEEE International Conference on Communication and Signal Processing, 2014, pp. 1669- 1673.
[6] Van dana B. Salve, “AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks”, IEEE International Conference on Electrical, Computer and Communication Technologies, 2015, pp. 1 – 7.
[7] Mohamed Guerroumi “Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink”IEEE International Conference on Information Technology, 2015, pp. 307- 313.
[8] Sheela, D. “A non cryptographic method of sink hole attack detection in wireless sensor networks” IEEE International Conference on Information Technology, 2011, pp. 527 – 532.
[9] Guerroumi, M., “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink” IEEE International Conference on Information Technology - New Generations, 2015, pp. 307 – 313.
[10] Varshney, K.K. “Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network” IEEE International Conference on Information Communication and Embedded Systems, 2014, pp. 1 – 5.
[11] Ritwik Banerjee “Energy efficient routing and bypassing energy-hole through mobile sink in WSN” IEEE Conf. on Computer Communication and Informatics (ICCCI), 2014, pp. 1 – 6.
[12] Babar Nazir “Mobile Sink based Routing Protocol (MSRP) for Prolonging Network Lifetime in Clustered Wireless Sensor Network” IEEE Conf. on Computer Applications and Industrial Electronics (ICCAIE), 2010, pp. 624 – 629.
[13] Pushpendu Karet “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes” IEEE Conf. on IEEE Transactions on Network and Service Management, 2016, pp. 99 – 112.
[14] Mitra, S “Energy aware fault tolerant framework in Wireless Sensor Network” IEEE Conf. on Applications and Innovations in Mobile Computing (AIMoC),2014,pp- 139 – 145.
[15] Deshpande, P. “Techniques improving throughput of wireless sensor network: A surveogies y” IEEE Conf. on Circuit, Power and Computing Technol (ICCPCT),2015,pp- 1 – 5.
[16] Makhdoom, I. “A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks” IEEE Conf. on Software Engineering Conference (NSEC), 2014 ,pp- 1 – 6.
[17] Krithiga, J “Efficient Code Guard mechanism against pollution attacks in interflow Network coding” IEEE Conf. on Communications and Signal Processing (ICCSP), 2014,pp- 1384 – 1388.
[18] Geetha, R. “Fuzzy logic based compromised node detection and revocation in clustered wireless sensor networks” IEEE Conf. on Information Communication and Embedded Systems (ICICES),2014,pp- 1 – 6.
[19] Yong-Sik Choi, “A study on sensor nodes attestation protocol in a WireleCACTss Sensor Network”, IEEE Conf. on Advanced Communication Technology (I), 2010, pp. 1738-9445.
[20] Yuling Lei “The Research of Coverage Problems in Wireless Sensor Network”, IEEE Conf. on Wireless Networks and Information Systems, 2009, pp 31 – 34.