Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29526

Select areas to restrict search in scientific publication database:
Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network
Routing security is a major concerned in Wireless Sensor Network since a large scale of unattended nodes is deployed in ad hoc fashion with no possibility of a global addressing due to a limitation of node-s memory and the node have to be self organizing when the systems require a connection with the other nodes. It becomes more challenging when the nodes have to act as the router and tightly constrained on energy and computational capabilities where any existing security mechanisms are not allowed to be fitted directly. These reasons thus increasing vulnerabilities to the network layer particularly and to the whole network, generally. In this paper, a Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing is presented where a dynamic time is used for collection window to collect Clear to Send (CTS) control packet in order to find an appropriate hoping node. The DWIGF is expected to minimize a chance to select an attacker as the hoping node that caused by a blackhole attack that happen because of the CTS rushing attack, which promise a good network performance with high packet delivery ratios.
Digital Object Identifier (DOI):


[1] Karlof, C. and Wagner, D., "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Elsevier-s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 2003, 1(2003), 293-315.
[2] Yick, J, Mukherjee, and Ghosal, D., "Wireless Sensor Network Survey", Journal of Elsevier: Computer Network, 2008 52(12):2292-2330.
[3] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "Analysis of Routing Attacks in Wireless Sensor Network", In Proceedings of International Cryptology Workshop and Conference (Cryptology2008), 2008, ISBN 978-983-4069, pp. 202-214.
[4] Kuo, C., Luk, M., Negi, R., and Perrig, A., "Message-In-A-Bottle: User Friendly and Secure Key Deployment for Sensor Nodes", In Proceedings of International Conference of Sensor System (SenSys2007), 2007, ACM-159593-763-6/07/0011.
[5] Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, "Energyefficient Communication Protocol For Wireless Sensor Networks", 2000. pp. 3005-3014.
[6] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks", IEEE Computer, 0018-9162/02, pp.54-62.
[7] Blum, B., He, T., Son, S, and Stankovic, J., "IGF: A State-Free Robust Communication Protocol For Wireless Sensor Network", Technical Report CS-2003-11, University of Virginia, 2003.
[8] Newsome, J., Shi, E., Song, D., and Perrig, A., "The Sybil Attacks In Sensor Networks: Analysis and Defense", In Proceedings of Third International Symposium on Information Processing in Sensor Networks, ACM 1-58113-846-6/04/0004, 2004.
[9] Wood, A.D., Lei, F., Stankovic, J., and Tian, H., "SIGF: A Family of Configurable, Secure Routing protocols for Wireless Sensor Networks", SASN2006, ACM 1-59593-554-1/060010, 2006, pp. 35-48.
[10] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks", IEEE Computer, 0018-9162/02, pp.54-62.
[11] Abu G.N., Kang K., and Liu K., "Towards Resilient Geographic Routing in WSNs", In Proceedings of Q2SWinet05, ACM 1-59593-241-0, 2005, pp. 71-78.
[12] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "A Taxanomy of Routing Attacks in Geographic Routing in Wireless Sensor Network", In Proceedings of 1st Engineering Postgraduate Conference (EPC2008): Innovation through Engineering, 2008.
Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007