About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
The 6th International Workshop on Trusted Collaboration

Research Article

Incident-Driven Routing in Wireless Sensor Networks, a Cross-layer Approach

Download835 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247142,
        author={Mohammad Reza Faghani and Uyen Trang Nguyen},
        title={Incident-Driven Routing in Wireless Sensor Networks, a Cross-layer Approach},
        proceedings={The 6th International Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={4},
        keywords={wireless sensor network secure routing cross-layer design},
        doi={10.4108/icst.collaboratecom.2011.247142}
    }
    
  • Mohammad Reza Faghani
    Uyen Trang Nguyen
    Year: 2012
    Incident-Driven Routing in Wireless Sensor Networks, a Cross-layer Approach
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2011.247142
Mohammad Reza Faghani,*, Uyen Trang Nguyen1
  • 1: York University
*Contact email: faghani@ieee.org

Abstract

Wireless sensor networks (WSNs) are being deployed widely thanks to recent advances in wireless communication technologies. Many WSNs may form in hostile environments, especially in military applications. Sensor nodes are thus prone to different types of attacks such as jamming, collision attacks, and eavesdropping. Once a sensor node is compromised, it is likely that the information passing through this node will be revealed to the attacker, or will never reach the destination (e.g., in jamming attacks). In this paper, we propose a cross-layer scheme that uses information from the application layer to locate compromised nodes, computes a new, secure path connecting the source and destination and routes data packets along the new path to the destination. We present our simulation and result visualization to show the effectiveness of the proposed incident-driven routing algorithm.

Keywords
wireless sensor network secure routing cross-layer design
Published
2012-04-06
Publisher
IEEE
http://dx.doi.org/10.4108/icst.collaboratecom.2011.247142
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL