Authentication Mechanism for Mobile Sink To Access Network in Wireless Sensor Network

International Journal of Communication and Media Science
© 2015 by SSRG - IJCMS Journal
Volume 2 Issue 2
Year of Publication : 2015
Authors : C.Rajasharavanan and M.Praveen Umar
pdf
How to Cite?

C.Rajasharavanan and M.Praveen Umar, "Authentication Mechanism for Mobile Sink To Access Network in Wireless Sensor Network," SSRG International Journal of Communication and Media Science, vol. 2,  no. 2, pp. 5-10, 2015. Crossref, https://doi.org/10.14445/2349641X/IJCMS-V2I2P107

Abstract:

In multihop wireless network security is an important phenomenon .Trust based routing is important than low cost shortest path routing.In this paper a RACE(Report based payment scheme)used for trust based routing.In this RACE based technique no other cryptographic operations used ,it will not increase the processing over head of network.One of the node can be used as accounting center it can identify the cheating node using trust based algorithm . In this evidences of nodes are required to identify the cheating node,it avoids the blindly routing of source node.Routing algorithm makes source node to establish the many trused routes to reach destination node.In this evidences of nodes are required to identify the cheating node. It is a robust efficient approach for the detection of the Black hole attack without any communication overhead.In this multi hop wireless network nodes also take part to route the other nodes packet by implementation of payment scheme.It ensure the cooperative mechanism of nodes and packet transmission is to be regulated,it enforce the fairness of network.

Keywords:

RACE,Trust based routing , Block hole attack.

References:

[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J.,vol. 13, no. 4, pp. 175-193, 2009.
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications Over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm.,vol. 25, no. 1, pp. 192-203, Jan. 2007.
[3] H. Gharavi, “Multichannel Mobile Ad Hoc Links for Multimedia Communications,” Proc. IEEE, vol. 96, no. 1, pp. 77-96, Jan. 2008.
[4] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom ’00,pp. 255-265, Aug. 2000.
[5] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas,“Cooperation Enforcement Schemes for MANETs: A Survey,”Wiley’s J. Wireless Comm. and Mobile Computing, vol. 6, no. 3,pp. 319-332, 2006.
[6] L. Buttyan and J. Hubaux, “Stimulating Cooperation in SelfOrganizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
[7] Y. Zhang, W. Lou, and Y. Fang, “A Secure Incentive Protocol for Mobile Ad Hoc Networks,” ACM Wireless Networks, vol. 13, no. 5,pp. 569-582, Oct. 2007.
[8] A. Weyland, “Cooperation and Accounting in Multi-Hop Cellular Networks,” PhD thesis, Univ. of Bern, Nov. 2005.
[9] A. Weyland, T. Staub, and T. Braun, “Comparison of MotivationBased Cooperation Mechanisms for Hybrid Wireless Networks,”J. Computer Comm., vol. 29, pp. 2661-2670, 2006.