Open Access Journal

ISSN : 2456-1304 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Science Engineering and Management (IJSEM)

Monthly Journal for Science Engineering and Management

ISSN : 2456-1304 (Online)

Intelligent Channel Aware Malicious Free Data Forwarding Scheme Over Wireless Sensor Networks

Author : Mohammad Sirajuddin 1

Date of Publication :24th November 2016

Abstract: In the communicative world each and every individual needs to perform global communication with failure-free intelligent model. Wireless Sensor Network, a medium which provides efficient communication modes to clients to satisfy their communication needs. However, this kind of wireless network channels are also facing lots of communication issues by means of several fault strategies, such as: link failures, node failures, bandwidth inefficiency, poor energy level, attacks and many more. So that, a fast growing network scheme is required as well as it provides lots of features to communication strategies and routing protocols, called Intelligent-Channel-Aware-Reputation Scheme [ICARS]. In the proposed system, the main objective is to provide the strong and failure-free wireless communication medium over networking with multiple numbers of nodes. As well as to provide high-level of security while the data is communicating from source to destination. For that powerful cryptographic algorithm is employed, called Modified Rijndael Algorithm (MRA) and to clearly state that the attack-free wireless communication channel with the help of intelligent routing strategies such as Route Request (RREQ) and Route Response (RREP).

Reference :

    1. I. Butun, S. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surv. & Tutor., vol. 16, no. 1, pp. 266–282, 2014. 
    2.  Y. Zou, X. Wang, and W. Shen, “Physical-layer security with multiuser scheduling in cognitive radio networks,” IEEE Trans. Commun., vol. 61, no. 12, pp. 5103–5113, 2013.
    3. B. Xiao, B. Yu, and C. Gao, “Chemas: Identify suspect nodes in selective forwarding attacks,” J. 1230, 2007.
    4. Y. Zhang, L. Lazos, and W. Kozma, “Amd: Auditbased misbehavior detection in wireless ad hoc networks,” IEEE Trans. Mob. Comput., prePrints, published online in Sept. 2013.
    5. S. Ozdemir, “Functional reputation based reliable data aggregation and transmission for wireless sensor networks,” Comput. Commun., vol. 31, no. 17, pp. 3941– 3953, 2008.
    6. D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, “A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks,” Comput. Commun., vol. 35, no. 17, pp. 2125– 2137, 2012.

Recent Article