IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

SRIP: A Secure Hybrid Routing Information Protocol for WSN

SRIP: A Secure Hybrid Routing Information Protocol for WSN
View Sample PDF
Author(s): Rajshree (Babasaheb Bhimrao Ambedkar University, India), Ravi Prakash Pandey (Dr. Ram Manohal Lohiya Awadh University, India), Sanjeev Sharma (Rajiv Gandhi Prodyogiki Vishwavidyalaya, India)and Vivek Shukla (Rajiv Gandhi Prodyogiki Vishwavidyalaya, India)
Copyright: 2010
Pages: 12
Source title: Strategic Pervasive Computing Applications: Emerging Trends
Source Author(s)/Editor(s): Varuna Godara (CEO of Sydney College of Management, Australia)
DOI: 10.4018/978-1-61520-753-4.ch006

Purchase

View SRIP: A Secure Hybrid Routing Information Protocol for WSN on the publisher's website for pricing and purchasing information.

Abstract

Security in Mobile Ad hoc Network (MANET)/ Wireless Sensor Network (WSN) is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks/ WSNs are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. In this chapter we are describing Route Falsification Attack which is easy to launch in MANETs or wireless ad hoc network. Route Falsification attack is referred to as a node with no special hardware capability can use packet encapsulation and tunneling to create bogus short-cuts in routing paths and influence data traffic to flow through them. This chapter shows the implementation of a Secure Hybrid Routing Information Protocol (SRIP) which can be used to prevent route falsification attack in MANETs. We evaluated performance of SRIP in Qualnet Simulator with and without route falsification attack. Our analysis indicates that SRIP is very suitable to stop this attack and performs well with low overhead in normal networks.

Related Content

Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou. © 2014. 20 pages.
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu. © 2014. 31 pages.
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese. © 2014. 33 pages.
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. © 2014. 22 pages.
Viktoriya Degeler, Alexander Lazovik. © 2014. 23 pages.
Vlasios Kasapakis, Damianos Gavalas. © 2014. 26 pages.
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu. © 2014. 18 pages.
Body Bottom