Secure and Distributed On-Demand Randomized Routing in WSN


  • V. Upendran Research Scholar,Department of Computer Science, Bharathiar University Coimbatore Tamil Nadu
  • R. Dhanapal Principal, K.C.S Kasinadar college of Arts and Science, Chennai – Tamil Nadu



Altruism, Particle Swarm Optimization, Routing, Security, Selfishness, Wireless Sensor Networks


Security and energy efficiency is of paramount importance in a wireless sensor network. This is due to their vulnerable
deployment conditions and battery based power. This paper presents a secure and distributed algorithm that generates
routes on-demand in a wireless sensor network. Dynamic route generation is facilitated by PSO, a metaheuristic
technique. Current network traffic in that route and charge contained in the candidate node are used as evaluation
parameters along with the node distance, hence a huge reduction in the packet loss was observed. Experiments were
conducted and it was observed that the proposed algorithm exhibits very low selection overhead and also provides
distributed routs, which eventually lead to prolonged network lifetime.


Download data is not yet available.


[1] Kaliappan, M. and Paramasivan, B. 2015. Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic
Bayesian Signalling Game model. Computers & Electrical Engineering 41: 301-313.
[2] Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V. and Wu Q. 2010. A survey of game theory as applied to network
security. In: Proceeding of 43rd Hawaii international conference on system sciences. Honolulu, HI (USA): IEEE; p. 1–
[3] Manshaei MH, Zhu Q, Alpcan T, Bacsar T. and Hubaux J. 2013. Game theory meets network security and privacy. J
ACM Comput Surveys-45(3):1–39.
[4] Lyu, Chen, Gu, D., Zhang, X., Sun, S., Zhang, Y. and Pande, A. 2015. SGOR: Secure and scalable geographic
opportunistic routing with received signal strength in WSNs. Computer Communications 59: 37-51.
[5] Patwari, N., Ash, J.N., Kyperountas, S., Hero, A.O., Moses, R.L., Correal, N.S. 2005. Locating the nodes: cooperative
localization in wireless sensor networks, IEEE Signal Process. Magaz. 22 (4) 54–69.
[6] Vaghefi, R.M., Gholami, M.R., Buehrer, R.M., Strom, E.G. 2013. Cooperative received signal strength-based sensor
localization with unknown transmit powers, IEEE Trans. Signal Process. 61 (6)1389–1403.
[7] So, H.C. and Lin, L. 2011. Linear least squares approach for accurate received signal strength based source
localization. IEEE Trans. Signal Process. 59 (8) 4035–4040.
[8] Sheng, Y., Tan, K., Chen, G. and Kotz, A. 2010. Campbell, Detecting 802.11 mac layer spoofing using received signal
strength, in: Proceedings of INFOCOM 2008, IEEE, pp. 1768–1776.
[9] Hu, Y.C. Perrig, A. and Johnson, D.B. 2005. Ariadne: a secure on-demand routing protocol for ad hoc networks,
Wirel. Netw. 11 (1–2) 21–38.
[10] Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C. and Rubens, H. 2008. Odsbr: an on-demand secure
byzantine resilient routing protocol for wireless ad hoc networks, ACM Trans. Inf. Syst. Secur. 10 (4) 6:1–6:35.
[11] Yu, M., Zhou, M. and Su, W. 2009. A secure routing protocol against byzantine attacks for Manets in adversarial
environments, IEEE Trans. Veh. Technol. 58 (1) 449.
[12] Sánchez-Carmona, Adrián, Robles, S. and Borrego, C. 2015. PrivHab+: A secure geographic routing protocol for
DTN. Computer Communications.
[13] Rawat P, Singh K, Chaouchi H. and Bonnin J. 2014. Wireless sensor networks: a survey on recent developments and
potential synergies. J Supercomput;68:1–48.
[14] Pathan AK, Hyung-Woo L, Choong-seon H. 2006. Security in wireless sensor networks: issues and challenges. In:
Proceedings of the 8th international conference advanced communication technology (ICACT 2006). Phoenix Park,
Korea; p. 1043-8.
[15] Sann Z. and Minn KT. 2011. Simulation of the rumor routing algorithm in sensor networks. In: Proceedings of the 3rd
international conference on computer research and development (ICCRD. Shanghai, China; p. 10-4.
[16] Hefeeda M. and Bagheri M. 2007. wireless sensor networks for early detection of forest fires. In: Proceedings of the
IEEE international conference on mobile adhoc and sensor systems (MASS 2007). Pisa, Italy; p. 1-6.
[17] Al Ameen M, Liu J, Kwak K. Security and privacy issues in wireless sensor networks for healthcare applications. J
Med Syst 2010; 36:93–101.
[18] Alrajeh NA, Alabed MS, Elwahiby MS. 2013. Secure ant-based routing protocol for wireless sensor network. Int J
Distrib Sens Netw.
[19] Kennedy, J. and Eberhart, R. 1995. Particle Swarm Optimization". Proceedings of IEEE International Conference on
Neural Networks IV. pp. 1942–1948.doi:10.1109/ICNN.1995.488968.
[20] Shi, Y. and Eberhart, R.C. 1998. A modified particle swarm optimizer. Proceedings of IEEE International Conference
on Evolutionary Computation. pp. 69–73.
[21] Eberhart, R.C. and Kennedy, J. 1995. A new optimizer using particle swarm theory, in: Proceedings of the Sixth
International Symposium on Micro Machine and Human Science, IEEE Press, Piscataway, NJ, pp. 39–



How to Cite

Upendran, V., & Dhanapal, R. (2016). Secure and Distributed On-Demand Randomized Routing in WSN. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(6), 6850-6856.