{"title":"A secured alternative path routing protocol against DoS attack","authors":"S. Tapaswi, C. Kavitha","doi":"10.1109/WOCN.2014.6923046","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are vulnerable to attacks as nodes are deployed in harsh environment depending on the application. We proposed A Secured Alternative path Routing Protocol against Dos Attack (SARP) method which prevents and detects the DoS attack in sensor network. The source node collects the data while sending the data to the sink the SARP uses alternative path to send the data these data need to secured in the transmitting region. Thus the sending node will calculate the trust value using the neighbor nodes report and the observed value. The neighbor report is collected from 2-Hop distance sensor node. The neighbor report is secured by using a secured session key.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2014.6923046","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Wireless sensor networks are vulnerable to attacks as nodes are deployed in harsh environment depending on the application. We proposed A Secured Alternative path Routing Protocol against Dos Attack (SARP) method which prevents and detects the DoS attack in sensor network. The source node collects the data while sending the data to the sink the SARP uses alternative path to send the data these data need to secured in the transmitting region. Thus the sending node will calculate the trust value using the neighbor nodes report and the observed value. The neighbor report is collected from 2-Hop distance sensor node. The neighbor report is secured by using a secured session key.