loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: K. Shaila 1 ; G. H. Vineet 1 ; C. R. Prashanth 1 ; V. Tejaswi 1 ; K. R. Venugopal 1 and L. M. Patnaik 2

Affiliations: 1 University Visvesvaraya College of Engineering Bangalore University, India ; 2 Defence Institute of Advanced Technology, India

ISBN: 978-989-8425-56-0

Keyword(s): Heterogeneous Networks, Key Distribution, Node Compromise, WSNs Security.

Related Ontology Subjects/Areas/Topics: Enterprise Information Systems ; Software Agents and Internet Computing ; Telecommunications ; Ubiquitous Computing ; Wireless and Mobile Computing ; Wireless and Mobile Technologies ; Wireless Information Networks and Systems

Abstract: Wireless Sensor Networks (WSNs) consists of a large number of tiny autonomous devices called sensors which are vulnerable to security threats. Heterogeneous Wireless Sensor Networks consists of two types of nodes L1 and L2 that employees Unbalanced Key Distribution Scheme to ensure enhanced security. In this paper, the concept of Link Strength is utilized, which determines the path to be selected for secure routing. Our Keymatches Constrained Secure Routing(KCSR) algorithm provides the flexibility to choose secure path and then route the data accordingly. In this approach, secure and stable paths are chosen for communication. Simulation results show that the proposed algorithm yields better results emphasizing security when compared with earlier works.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.206.13.39

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Shaila, K.; Vineet, G.; Prashanth, C.; Tejaswi, V.; Venugopal, K. and Patnaik, L. (2011). KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS.In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 978-989-8425-56-0, pages 13-22. DOI: 10.5220/0003438700130022

@conference{iceis11,
author={K. Shaila. and G. H. Vineet. and C. R. Prashanth. and V. Tejaswi. and K. R. Venugopal. and L. M. Patnaik.},
title={KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2011},
pages={13-22},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003438700130022},
isbn={978-989-8425-56-0},
}

TY - CONF

JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
SN - 978-989-8425-56-0
AU - Shaila, K.
AU - Vineet, G.
AU - Prashanth, C.
AU - Tejaswi, V.
AU - Venugopal, K.
AU - Patnaik, L.
PY - 2011
SP - 13
EP - 22
DO - 10.5220/0003438700130022

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.