2016
DOI: 10.5120/cae2016652472
|View full text |Cite
|
Sign up to set email alerts
|

GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks

Abstract: GRPW-MuS (Geographic Routing to Multiple Sinks in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks . GRPW-MuS, a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…In routing ,various multipath routing technique is used for best redundancy path with high energy efficiency efficiency [9]. Watchdog technique is a detection technique, where each node can observers their neighboring nodes within the radio range [10].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…In routing ,various multipath routing technique is used for best redundancy path with high energy efficiency efficiency [9]. Watchdog technique is a detection technique, where each node can observers their neighboring nodes within the radio range [10].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Based on these limitations, they are arranged in noisy environment, it is highly affected and sensitive to several types of attacks [5]. Basically, sensor nodes are category by four sub-systems [6][7][8][9][10][11][12][13]14]. Processor and memory, transceiver, sensor and battery.…”
Section: Introductionmentioning
confidence: 99%
“…A wormhole attacks can be freely carried out across routing in the sensor networks. Routing protocols has no mechanism to prevent against it [11]. In other words, when the wormhole attacks occurs, it dropping all the packets and cause network interruption.…”
Section: Wormhole Attackmentioning
confidence: 99%
“…A cross‐layer solution SCA is proposed in Sousa and Kumar 78 that merges a truncated ARQ in the link layer and collaborative diversity at the physical layer 79 . However, attacks like misdirection, black hole, wormhole, and replay could break the current route or prevent a new route 72 …”
Section: Service Discovery and Cluster‐based Routing Protocolsmentioning
confidence: 99%