International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering 3 (7):31-35 (2015)
  Copy   BIBTEX

Abstract

We propose a new routing protocol, which is anonymous secure routing (AASR), to satisfy the requirement and defend the attacks. the route request packets are authenticated by a group signature, the potential active attacks without unveiling the node identities. The key-encrypted onion routing with a route secret verification message, is designed to prevent intermediate nodes from inferring a real destination.We address fault tolerance in wireless sensor networks .In sensed data streams indicate the spread of malicious attacks, hardware failure and software corruption among the different nodes in a Wireless Sensor Network. we start by providing a short summary of sensor networks and classical fault tolerance techniques in the system, we discuss the three phases of fault tolerance detection and identification at four levels of abstractions (hardware, system software, middleware, and applications) and four scopes the factors of the node infected can be generated and incoming data streams resulting in chances of inaccurate data misleading packet transmission wrong decision making and server communication disruption. Wireless sensor network composed of very large number of low cost micro-sensors. A wireless sensor network of the type refer a group of the sensors, or node, that are linked by a wireless medium to perform the distributing the sensing tasks. With the new system like micro-electro-Mechanical system(MEMS) technology taking low power in wireless sensor network communication. Now the big challenge is that to produce the wireless sensor nodes at low cost. The network is used to collect and send the various types of data and message to the destination. The low cost WSN has the limited battery power and the replacing the battery is the not a solution in the network because large nodes will be there.

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Adaptive Depth-Based Routing Protocol for Energy-Constrained Underwater Wireless Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):635-640.
OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.

Analytics

Added to PP
2025-03-06

Downloads
25 (#970,595)

6 months
25 (#131,529)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references