-
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Authors:
P. Samundiswary,
D. Sathian,
P. Dananjayan
Abstract:
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the network coordinates with every other node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as sele…
▽ More
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the network coordinates with every other node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as selective forwarding and sinkhole. These attacks can inject malicious packets by compromising the node. Geographical routing protocols of wireless sensor networks have been developed without considering the security aspects against these attacks. In this paper, a secure routing protocol named secured greedy perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery ratio of the networks.
△ Less
Submitted 3 September, 2010;
originally announced September 2010.
-
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Authors:
R. Valli,
P. Dananjayan
Abstract:
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the lifetime of both the nodes and the network. One efficient way of power management is to control the power at which the nodes transmit. In this paper, a virtual multiple input multiple output wireless sensor network (VMIMO-…
▽ More
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the lifetime of both the nodes and the network. One efficient way of power management is to control the power at which the nodes transmit. In this paper, a virtual multiple input multiple output wireless sensor network (VMIMO-WSN)communication architecture is considered and the power control of sensor nodes based on the approach of game theory is formulated. The use of game theory has proliferated, with a broad range of applications in wireless sensor networking. Approaches from game theory can be used to optimize node level as well as network wide performance. The game here is categorized as an incomplete information game, in which the nodes do not have complete information about the strategies taken by other nodes. For virtual multiple input multiple output wireless sensor network architecture considered, the Nash equilibrium is used to decide the optimal power level at which a node needs to transmit, to maximize its utility. Outcome shows that the game theoretic approach considered for VMIMO-WSN architecture achieves the best utility, by consuming less power.
△ Less
Submitted 29 July, 2010;
originally announced July 2010.
-
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
Authors:
R. Shankar,
Timothy Rajkumar. K,
P. Dananjayan
Abstract:
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is develo**, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLA…
▽ More
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is develo**, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results obtained using OPNET 14.5 shows that the proposed protocol outperforms existing interworking protocols both in security and QoS.
△ Less
Submitted 29 July, 2010;
originally announced July 2010.