High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Provenance based Compromised Node Detection in Shortest Path in WSN

Author(s):

Prabin Bhusal , sambhram institute of technology ,ms-palya bangalore; Dr. Veena C. S, sambhram institute of technology Ms-Palya bangalore

Keywords:

Node Detection, Shortest Path, Wireless Sensor Network

Abstract

Communication is very important to get the information about any subject matter and to make the decision. It may in military/defense sector, telecom, and medical sector or in missiles technology, secure transfer of information in very important to make the proper decision making. Sensors are deployed in numerous application to collect the information which are transferred to base station for the decision making process. Provenance based method is used to ensure the safety of the data. The provenance information is encoded in in-packet bloom filter and data is transferred to the base station through the shortest path. The base station regenerate the data and further helps in the decision making process. This method is extended to detect the compromised node which ensures the safety of the data packet.

Other Details

Paper ID: IJSRDV6I80376
Published in: Volume : 6, Issue : 8
Publication Date: 01/11/2018
Page(s): 639-641

Article Preview

Download Article