SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
The International Journal of Engineering
And Science (IJES)
||Volume|| 1 ||Issue|| 2 ||Pages|| 98-105 ||2012||
ISSN: 2319 – 1813 ISBN: 2319 – 1805
           ENHANCED GREEDY PERIMETER STATELESS
                ROUTING PROTOCOL (E-GPSR)
                1,
                  Kamiya shrivastava, 2, Asst Professor Satendra .k. Jain
                                                   1,
                                              M.Tech, Research Scholar
                     1,2,
                        Department of Co mputer Application Samrat Ashok Technological Institute
                                                  Vid isha (M.P.)



-------------------------------------------------Abstract--------------------------------------------------------------
Wireless sensor networks are collections of large nu mber of sensor nodes. The sensor nodes are fea tured with
limited energy, computation and transmission power. Each node in the network coordinates with every other
node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure
environment; they are vulnerable to different types of attacks such as selective forwarding and sybil. These
attacks can inject malicious packets by compro mising the node. Geographical routing protocols of wireless
sensor networks have been developed without considering the security aspects against these attacks. In this
paper, a mo re efficient routing protocol named enhanced greedy perimeter stateless routing protocol (E-GPSR)
is proposed for mobile sensor networks by incorporating the concept of „observation time‟ to the existing tru st
based secured greedy perimeter stateless routing protocol (S-GPSR). Simu lation results proves that „Enhanced
greedy Perimeter stateless Routing‟ outperforms the S-GPSR by reducing the over head and improving the
delivery rat io of the network.

Keywords: Wireless sensor network, GPSR protocol, secured GPSR, Enhanced GPSR, co mpro mised nodes,
Sybil attack, selective fo rwarding attack.

--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 1, December, 2012                                                Date of Publication: 15, December 2012
---------------------------------------------------------------------------------------------------------------------------------------

1. Introduction
1.1 Wireless sensor Network
         Wireless sensor networks (WSN) are now used in many applications including military, environ mental,
healthcare applications, home automation and traffic control. It consists of a large number of sensor n odes,
densely deployed over an area. A wireless sensor network [1] typically consists of a very large number of small,
inexpensive, disposable, robust, and low power sensor nodes working cooperatively. Wireless sensor network
generally co mposed of a large number of distributed sensor nodes that organize themselves into a mult i-hop
wireless network. Each network is equipped with more than one sensors, processing units,

         controlling units, transmitting units etc. Typically, the sensor nodes coordinate themselves to perform a
common task. Sensor nodes are capable of collaborating with one another and measuring the condition of their
surrounding environments. The sensed measurements are then transformed into [2] digital signals and processed
to reveal some properties of the phenomena around sensors. Due to the fact that the sensor nodes in WSN have
short radio transmission range, intermediate nodes act as relay nodes to transmit data towards the sink node
using multipath. The deploy ment of sensor nodes based upo n the application types.

          Recently wireless sensor networks have drawn a lot of attention due to broad applications in military
and civilian operations. Sensor nodes in the network are characterized by severely constrained, energy resources
and communicational capabilities. Due to small size and inattention of the deployed nodes, attackers can easily
capture and rework them as malicious nodes. Karloff and Wagner also have revealed that routing protocols of
sensor networks are insecure and highly vulnerable to malicious nodes




www.theijes.com                                                The IJES                                                     Page 98
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)




                           Figure 1: Basic structure of a Wireless sensor Network

          It can either join the network externally or may originate internally by compro mising an existing
benevolent node . The attacks launched by internally generated compro mised nodes are the most dangerous type
of attacks. These compro mised nodes can also carry out both passive and active attacks against the networks . In
passive attack a malicious node only eavesdrops upon the packet contents, while in active attacks it may imit ate,
drop or modify leg itimate packets . Sinkhole is one of the common type of active attack in which a node, can
deceitfully modify the routing packets. So, it may lure other sensor nodes to route all traffic through it. The
impact of sinkhole is to launch further active attacks on the traffic, wh ich is routed through it
Due to limited capabilities of sensor nodes, providing security and privacy against these attacks is a challenging
issue to sensor networks. In order to protect network against malicious attackers, numbers of routing protocols
have been developed to improve network performance with the help of cryptographic techniques. Security
mechanis ms used in these routing protocols of sensor networks detect the compro mised nod e and then revoke
the cryptographic keys of the network. But, requirements of such secure routing protocols include configuration
of the nodes with encryption keys and the creation of a centralized or distributed key repository to realize
different security services in the network. This paper is organized as follow : Section 2 describes about the
greedy perimeter stateless routing (GPSR). Section 3 deals with the Secured GPSR (S-GPSR). Sect ion 4
elaborates the proposed Enhanced Greedy Perimeter Stateless Ro uting (E-GPSR) for Wireless Sensor Network.
Simu lation result are described in section 5. Section 6 defines the conclusion.

2. Greedy Perimeter Stateless Routing
          Routing in sensor networks is very challenging due to several characteristics that distinguish them fro m
contemporary co mmunication and wireless ad-hoc networks. First of all, it is not possible to build a global
addressing scheme for the deployment of sheer number of sensor nodes. Therefore, traditional IP -based
protocols cannot be applied to sensor networks. Second, in contrary to typical co mmunication networks almost
all applications of sensor networks require the flow of sensed data from mult iple sources to a particular sink.
Third, generated data traffic has significant redundancy in it since mu ltip le sensors may generate same data
within the vicinity of a phenomenon. Such redundancy needs to be explo ited by routing protocols to improve
energy and bandwidth utilizat ion. Fourth, sensor nodes are tightly constrained in terms of transmission power,
on-board energy, processing capacity and storage and thus require careful resource management. Due to the
above differences, many new algorith ms have been proposed for the problem of routing data in sensor networks.
These routing mechanisms have considered the characteristics of sensor nodes along with the application and
architecture requirements. Almost all routing protocols can be classified as data-centric, hierarchical or location-
based although there are few distinct ones based on network flow or QoS awareness. Data-centric protocols are
query-based and depend on the naming of desired data, which helps in eliminating many redundant
transmissions. Hierarchical protocols aim at clustering the nodes so that cluster heads can do some aggregation
and reduction of data in order to save energy . Location-based protocols utilize the position information to relay
the data to desired regions rather than the whole network. The Greedy Perimeter Stateless Routing is one of the
commonly used location-based routing protocols for establishing and maintaining a sensor network. This
protocol virtually operates in routing. In GPSR, it is assumed that all nodes recognize the geographical position
of destination node with which communicat ion is desired. This location information (i.e.) geographical position
is also used to route traffic to its requisite destination from the source node through the shortest path. Each
transmitted data

www.theijes.com                                       The IJES                                            Page 99
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)

packet fro m node contains the destination node‟s identification and its geographical position in the form of t wo
four-byte float numbers. Each node also periodically transmits a beacon, to inform its adjacent nodes regarding
its current geographical co-ordinates. The node positions are recorded, maintained and updated in a
neighborhood table by all nodes receiving the beacon. To reduce the overhead due to periodic beacons, the node
positions are piggy-backed onto forwarded data packets. GPSR supports two mechanisms for forwarding data
packets: greedy forward ing and perimeter forwarding

2.1 .Greedy Forwarding
         In the first mechanism, all data packets are forwarded to an adjacent neighbor that is geographically
positioned closer to the intended destination. This mechanis m is known as greedy forwarding. The forward ing is
done on a packet to packet basis . Hence, min imal state information is required to be retained by all nodes. It
makes protocol most suitable for resource starved devices. The greedy forwarding mechanism is shown in
Figure1. Ho wever, this mechanis m is susceptible to failure in situations where the distance between forwarding
node and final destination is less than the distance between the forwarding node‟s adjacent neighbors and
destination.




                                    Figure 1. Greedy forwarding mechanism

2.2. Perimeter Forwardi ng
          To overcome routing problems in such scenarios, GPSR engages perimeter forwarding mode. In
perimeter mode, the data packet is marked as being in perimeter mode along with the location where greedy
forwarding failed. These perimeter mode packets are forwarded using simple planar grap h traversal. Each node
receiving a data packet marked as in perimeter mode uses the right-hand rule to forward packets to nodes, which
are located counterclockwise to the line joining forwarding node and the destination. The perimeter fo rwarding
mechanis m is shown in Figure 2. Each node, while forwarding perimeter mode packets, compares its present
distance to the destination from the point where greedy forwarding has failed. If the current distance is less,
packet is routed through greedy forwarding repeatedly from that point onwards. The protocol has been designed
and developed based on the assumption that all nodes in the network would execute the protocol in a sincere
manner. Ho wever, due to number of reasons including malice, inco mpetence and selfishnes s, nodes frequently
deviate fro m defined standards leading to routing predicaments.




                                   Figure 2. Perimeter forwarding mechanis m

www.theijes.com                                      The IJES                                         Page 100
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)

3. SECURED GREEDY PERIMETER STATELESS ROUTING (S-GPSR)
           GPSR scans its neighborhood table to retrieve the next hop which is optimal and leads to the
destination, during packet transmission to a known host. As there may be more than one such hop available,
GPSR selects an adjacent neighbor that has the least distance to a p articular destination. In S-GPSR, the trust
levels used in conjunction with the geographical distances are incorporated in the neighborhood table to create
the most trusted distance route rather than the default min imal distance To compute direct trust in a node, an
effort-return based trust model is used . The accuracy and sincerity of immediate neighboring nodes is ensured
by observing their contribution to packet forwarding mechanis m. To imp lement the trust derivation mechanism,
Trust Update Interval (TUI) of each forwarded packet is buffered in the node as (GPSR Agent::buffer packet).
The TUI is a very critical co mponent of such a trust model. It determines the time a node should wait before
assigning a trust or distrust level to a node based upon the results of a particular event. After transmission, each
node promiscuously listens for the neighboring node to forward the packet. If neighbor forwards the packet in
proper manner within the TUI, its corresponding trust level is incremented. However, if the neighboring node
modifies the packet in an unexpected manner or does not forward the packet at all, its trust level is decremented.
Every time a node transmits a data or control packet, it immediately brings its receiver into pro miscuous mode
(GPSR Agent::tap), so as to overhear its immediate neighbor forwarding the packet . The sending node verifies
the different fields in the forwarded IP packet for requisite modifications through a sequence of integrity checks
(GPSR Agent::verify packet integrity). If the integrity checks succeed, it confirms that the node has acted in a
benevolent manner and so its direct trust counter is incremented. On the other hand, if the integrity checkfails or
the forward ing node does not transmit the packet at all, then its corre sponding direct trust measure is
decremented so that the node is treated as malicious node. The S-GPSR is explained by using flow chart which
is illustrated through Figure 3.




4. Enhanced Greedy Perimeter Stateless Routing (E-GPSR)
          In the basic GPSR method, it scans its neighborhood table to retrieve the next hop which is optimal
and leads to the destination during packets transmission or data transmission to known host. As there may be
more than one such hop available , GPSR selects an adjacent neighbor that has the least distance to a particular
destination. In contrast to GPSR , Secured greedy perimeter stateless routing (S-GPSR) introduced the concept
of trust level wh ich resulted a more secured routing over a geographical area or over a location bas ed routing.
But again S-GPSR lacked in terms of efficiency as a common o r constant trust update interval for several nodes
may be troublesome in case of heavy traffic. Efficient greedy perimeter stateless routing (E-GPSR) introduces
the concept of “OBSERVATION TIM E (OT)” for each node separately in addition to the trust level. Both these
Observation time (OT) and Trust level (TLC) is incorporated in the neighborhood table to established the most
trusted distance route rather than the default min imal distance which not optimu m distance. To compute direct

www.theijes.com                                       The IJES                                          Page 101
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)

         trust and an optimal next node‟s address , an effort return based model is used . The mechanism proves
to be more efficient as the analysis is being observed on the basis of the accurate and sincere contribution of the
immed iate neighbor nodes. The whole mechanism o f generating the secure, trust base and efficient model
consist of two major steps:

    1.   Generation of Observation time fo r each node.
    2.   Trusted route selection

4.1 GEN EARTION OF OBS ERVATION TIME FOR EACH NODE:
Since the trust level count (TLC) , fo r each node that forwards a packet is initialized ,at the same t ime the “
Observation Time” of each node is maintained ,wh ich is calcu lated on the acc ount of the buffered forwarded
data packets in the node ( GPSR Agent :: buffer packet




). The Observation Time is very critical and impo rtant measure for efficient routing. It determines the time that a
node takes to decide a most trusted and minimal route rather than a default minimal distance. The Observation
time counter (OTC) is maintained by the observation of the neighboring nodes. The Observation Time Counter
(OTC) field is updated by the monitoring of the average packet fo rwarding delay. Each t ime, if the packet is
forwarded within the Observation Time the POSITIVE TRUST is generated for the particular node, else the
NEGATIVE TRUST is generated for the Forwarding node

4.2 .TRUS TED ROUTE S EL ECTION
          Whenever a packet is to be forwarded a best and optimal node is to be selected. The selection of the
trusted node is done on the basis of the TRUST COUNT for each nodes. A node with best TRUST COUNT is
selected as the next node to be forward the packet along with the optimal minimu m distance. Every t ime a node
transmits a data packet within an OBSERVATION TIM E , its neighbors overhears it immediately (forwarding
packet) . The sending node verifies the different field in the forwarded IP packets and check for integrity. If the
integrity check succeeds, it confirms that the node has acted in a benevolent manner.


www.theijes.com                                       The IJES                                           Page 102
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)
5. Simulation Results
          The trust and the mobility model is imp lemented in the existing S-GPSR protocol to obtain Enhanced
GPSR protocol. The E-GPSR protocol is simulated using OPNET 14.0 to emulate selective forwarding and
Sybil attacks in mobile sensor networks. The network animator outputs for 100 nodes with 10 malicious nodes.
The performance parameters such as delay, packet dropped, routing traffic received and traffic sent and received
bits/ sec and packets/ sec is calculated.

                           SIMULATION PARAMETRS                 VALUES
                           No. Of Nodes                         100-150
                           Graphical Area                       100X 100 m
                           Packet Size                          512
                           Traffic Type                         CBR
                           No . of Malicious Nodes              5 to 25
                           Simulati on Time                     100 s




         Fig : Total traffic sent in case of selecti ve forwarding and E-GPRS method and S-GPRS




                     Fig : total packets dropped in case of selective forwarding attack




www.theijes.com                                      The IJES                                        Page 103
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)




                  Fig : total del ay in case of Selective Forwarding attack




                        Fig : total traffic sent in case of Sybil attack




                       Fig : packets dropped i n case of S ybil attack




                          Fig :Total del ay in case of Sybil attack



www.theijes.com                             The IJES                          Page 104
Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR)

6. Conclusion
         Enhanced greedy perimeter stateless routing protocol is implemented for mobile sensor network with
different coverage area considering 100 and 150 number of nodes for simu lation. It is compared with secured
greedy perimeter stateless routing protocol for different nu mber of malicious nodes. The results show that on the
average, the routing overhead achieved using the E-GPSR protocol was 7o% less than the standard S-GPSR
protocol. Further more, an imp rovement of 25% in the delivery rat io have been achieved in the E-GPSR
protocol. The improvement in the above mentioned network performance is mainly due to smaller trust values,
shorter routing decisions and less number of control packets taken by the trust based model imp lemented in
GPSR to get rid of the attackers.

REFERENCES :
[1]  C.Karlof & D.Wagner, (2003) “Secure routing in wireless sensor networks: Attacks & countermeasures”,
     Proceedings of the 1st IEEE International Workshop on Sensor Network
     Protocols & Applications, Anchorage, AK, pp.113-127.
[2]  S.Carter & A.Yasinac, Y.C.Hu, (2002) “Secure position aided ad -hoc routing protocol”, Proceedings of
     the IASTED Conference on Co mmunications & Co mputer Networks (CCN), Cambridge, MA, USA,
     pp.329-324.
[3]  Y.C.Hu, A.Perrig & DB.Johnson,(2002) “Ariadne: A secure on-demand routing protocol for adhoc
     networks”, Proceedings of the Eighth Annual International Conference on Mobile Co mputing &
     Networking (MobiCo m), At lanta, Georgia, USA, pp.12-23.
[4]  B.Dahill, B.N.Levine, E.Royer & C.Shields, (2002) “A secure routing protocol for ad-hoc
     networks”, Proceedings of the IEEE International Conference on Network Protocols (ICNP), Paris,
     France, pp.78-87.
[5]  Adrian Perrig & Robert Szewczy k, Victor Wen, Dav id Culler & J.D.Tygar,(2001) “SPINS: Security
     Protocols for Sensor Netwo rks”, Proceedings of ACM Seventh Annual International Conference on
     Mobile Co mputing & Networking, Ro me, Italy, pp.189-199.
[6]  W.Stallings, (2000) Network Security Essentials , Prentice Hall.
[7]  Asad Amir Pirzada & Chris McDonald, (2005) “Circu mventing sinkholes & wormholes in wireless
     sensor networks”, Proceedings of 2nd IEEE International Workshop on Wireless Ad-hoc Networking,
     Colu mbus, USA, pp.132-150.
[8]  Jamal N.Al-Karaki and Ahmed E.Kamal, (2004) “Routing Techniq ues in Wireless Sensor Networks: A
     Survey”, IEEE Transactions on Wireless Co mmunication, Vol. 11, No.6, pp.6-20.
[9]  Brad Karp & H.T.Kung, (2000) “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”,
     Proceedings of Sixth Annual International Conference on Mobile Co mputing & Networking, Boston,
     pp.243-254.
[10] A.Pirzada & C.McDonald, (2004) “Establishing trust in pure ad -hoc networks”, Proceedings of 27th
     Australasian Co mputer Science Conference (ACSC), Dunedin, New Zealand, Vol. 26, No.1, pp.47-54.
[11] Asad Amir Pirzada & Chris McDonald, (2007) “Trusted greedy perimeter stateless routing”,
     Proceedings of 15th IEEE International Conference on Networks (ICON 2007), Adelaide, Australia,
     pp.206-211.




www.theijes.com                                      The IJES                                          Page 105

Contenu connexe

Tendances

Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Meena S Pandi
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

Tendances (20)

Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
S04404116120
S04404116120S04404116120
S04404116120
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
D0961927
D0961927D0961927
D0961927
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

En vedette

En vedette (19)

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
M0364073079
M0364073079M0364073079
M0364073079
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
G03502033039
G03502033039G03502033039
G03502033039
 
C0362015022
C0362015022C0362015022
C0362015022
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A036501014
A036501014A036501014
A036501014
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
J0362069073
J0362069073J0362069073
J0362069073
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
J03601059064
J03601059064J03601059064
J03601059064
 
C0364012016
C0364012016C0364012016
C0364012016
 
G0362046052
G0362046052G0362046052
G0362046052
 
G03601038042
G03601038042G03601038042
G03601038042
 

Similaire à The International Journal of Engineering and Science (IJES)

Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
ijtsrd
 

Similaire à The International Journal of Engineering and Science (IJES) (20)

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
G0933443
G0933443G0933443
G0933443
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 

The International Journal of Engineering and Science (IJES)

  • 1. The International Journal of Engineering And Science (IJES) ||Volume|| 1 ||Issue|| 2 ||Pages|| 98-105 ||2012|| ISSN: 2319 – 1813 ISBN: 2319 – 1805 ENHANCED GREEDY PERIMETER STATELESS ROUTING PROTOCOL (E-GPSR) 1, Kamiya shrivastava, 2, Asst Professor Satendra .k. Jain 1, M.Tech, Research Scholar 1,2, Department of Co mputer Application Samrat Ashok Technological Institute Vid isha (M.P.) -------------------------------------------------Abstract-------------------------------------------------------------- Wireless sensor networks are collections of large nu mber of sensor nodes. The sensor nodes are fea tured with limited energy, computation and transmission power. Each node in the network coordinates with every other node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as selective forwarding and sybil. These attacks can inject malicious packets by compro mising the node. Geographical routing protocols of wireless sensor networks have been developed without considering the security aspects against these attacks. In this paper, a mo re efficient routing protocol named enhanced greedy perimeter stateless routing protocol (E-GPSR) is proposed for mobile sensor networks by incorporating the concept of „observation time‟ to the existing tru st based secured greedy perimeter stateless routing protocol (S-GPSR). Simu lation results proves that „Enhanced greedy Perimeter stateless Routing‟ outperforms the S-GPSR by reducing the over head and improving the delivery rat io of the network. Keywords: Wireless sensor network, GPSR protocol, secured GPSR, Enhanced GPSR, co mpro mised nodes, Sybil attack, selective fo rwarding attack. -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 1, December, 2012 Date of Publication: 15, December 2012 --------------------------------------------------------------------------------------------------------------------------------------- 1. Introduction 1.1 Wireless sensor Network Wireless sensor networks (WSN) are now used in many applications including military, environ mental, healthcare applications, home automation and traffic control. It consists of a large number of sensor n odes, densely deployed over an area. A wireless sensor network [1] typically consists of a very large number of small, inexpensive, disposable, robust, and low power sensor nodes working cooperatively. Wireless sensor network generally co mposed of a large number of distributed sensor nodes that organize themselves into a mult i-hop wireless network. Each network is equipped with more than one sensors, processing units, controlling units, transmitting units etc. Typically, the sensor nodes coordinate themselves to perform a common task. Sensor nodes are capable of collaborating with one another and measuring the condition of their surrounding environments. The sensed measurements are then transformed into [2] digital signals and processed to reveal some properties of the phenomena around sensors. Due to the fact that the sensor nodes in WSN have short radio transmission range, intermediate nodes act as relay nodes to transmit data towards the sink node using multipath. The deploy ment of sensor nodes based upo n the application types. Recently wireless sensor networks have drawn a lot of attention due to broad applications in military and civilian operations. Sensor nodes in the network are characterized by severely constrained, energy resources and communicational capabilities. Due to small size and inattention of the deployed nodes, attackers can easily capture and rework them as malicious nodes. Karloff and Wagner also have revealed that routing protocols of sensor networks are insecure and highly vulnerable to malicious nodes www.theijes.com The IJES Page 98
  • 2. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) Figure 1: Basic structure of a Wireless sensor Network It can either join the network externally or may originate internally by compro mising an existing benevolent node . The attacks launched by internally generated compro mised nodes are the most dangerous type of attacks. These compro mised nodes can also carry out both passive and active attacks against the networks . In passive attack a malicious node only eavesdrops upon the packet contents, while in active attacks it may imit ate, drop or modify leg itimate packets . Sinkhole is one of the common type of active attack in which a node, can deceitfully modify the routing packets. So, it may lure other sensor nodes to route all traffic through it. The impact of sinkhole is to launch further active attacks on the traffic, wh ich is routed through it Due to limited capabilities of sensor nodes, providing security and privacy against these attacks is a challenging issue to sensor networks. In order to protect network against malicious attackers, numbers of routing protocols have been developed to improve network performance with the help of cryptographic techniques. Security mechanis ms used in these routing protocols of sensor networks detect the compro mised nod e and then revoke the cryptographic keys of the network. But, requirements of such secure routing protocols include configuration of the nodes with encryption keys and the creation of a centralized or distributed key repository to realize different security services in the network. This paper is organized as follow : Section 2 describes about the greedy perimeter stateless routing (GPSR). Section 3 deals with the Secured GPSR (S-GPSR). Sect ion 4 elaborates the proposed Enhanced Greedy Perimeter Stateless Ro uting (E-GPSR) for Wireless Sensor Network. Simu lation result are described in section 5. Section 6 defines the conclusion. 2. Greedy Perimeter Stateless Routing Routing in sensor networks is very challenging due to several characteristics that distinguish them fro m contemporary co mmunication and wireless ad-hoc networks. First of all, it is not possible to build a global addressing scheme for the deployment of sheer number of sensor nodes. Therefore, traditional IP -based protocols cannot be applied to sensor networks. Second, in contrary to typical co mmunication networks almost all applications of sensor networks require the flow of sensed data from mult iple sources to a particular sink. Third, generated data traffic has significant redundancy in it since mu ltip le sensors may generate same data within the vicinity of a phenomenon. Such redundancy needs to be explo ited by routing protocols to improve energy and bandwidth utilizat ion. Fourth, sensor nodes are tightly constrained in terms of transmission power, on-board energy, processing capacity and storage and thus require careful resource management. Due to the above differences, many new algorith ms have been proposed for the problem of routing data in sensor networks. These routing mechanisms have considered the characteristics of sensor nodes along with the application and architecture requirements. Almost all routing protocols can be classified as data-centric, hierarchical or location- based although there are few distinct ones based on network flow or QoS awareness. Data-centric protocols are query-based and depend on the naming of desired data, which helps in eliminating many redundant transmissions. Hierarchical protocols aim at clustering the nodes so that cluster heads can do some aggregation and reduction of data in order to save energy . Location-based protocols utilize the position information to relay the data to desired regions rather than the whole network. The Greedy Perimeter Stateless Routing is one of the commonly used location-based routing protocols for establishing and maintaining a sensor network. This protocol virtually operates in routing. In GPSR, it is assumed that all nodes recognize the geographical position of destination node with which communicat ion is desired. This location information (i.e.) geographical position is also used to route traffic to its requisite destination from the source node through the shortest path. Each transmitted data www.theijes.com The IJES Page 99
  • 3. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) packet fro m node contains the destination node‟s identification and its geographical position in the form of t wo four-byte float numbers. Each node also periodically transmits a beacon, to inform its adjacent nodes regarding its current geographical co-ordinates. The node positions are recorded, maintained and updated in a neighborhood table by all nodes receiving the beacon. To reduce the overhead due to periodic beacons, the node positions are piggy-backed onto forwarded data packets. GPSR supports two mechanisms for forwarding data packets: greedy forward ing and perimeter forwarding 2.1 .Greedy Forwarding In the first mechanism, all data packets are forwarded to an adjacent neighbor that is geographically positioned closer to the intended destination. This mechanis m is known as greedy forwarding. The forward ing is done on a packet to packet basis . Hence, min imal state information is required to be retained by all nodes. It makes protocol most suitable for resource starved devices. The greedy forwarding mechanism is shown in Figure1. Ho wever, this mechanis m is susceptible to failure in situations where the distance between forwarding node and final destination is less than the distance between the forwarding node‟s adjacent neighbors and destination. Figure 1. Greedy forwarding mechanism 2.2. Perimeter Forwardi ng To overcome routing problems in such scenarios, GPSR engages perimeter forwarding mode. In perimeter mode, the data packet is marked as being in perimeter mode along with the location where greedy forwarding failed. These perimeter mode packets are forwarded using simple planar grap h traversal. Each node receiving a data packet marked as in perimeter mode uses the right-hand rule to forward packets to nodes, which are located counterclockwise to the line joining forwarding node and the destination. The perimeter fo rwarding mechanis m is shown in Figure 2. Each node, while forwarding perimeter mode packets, compares its present distance to the destination from the point where greedy forwarding has failed. If the current distance is less, packet is routed through greedy forwarding repeatedly from that point onwards. The protocol has been designed and developed based on the assumption that all nodes in the network would execute the protocol in a sincere manner. Ho wever, due to number of reasons including malice, inco mpetence and selfishnes s, nodes frequently deviate fro m defined standards leading to routing predicaments. Figure 2. Perimeter forwarding mechanis m www.theijes.com The IJES Page 100
  • 4. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) 3. SECURED GREEDY PERIMETER STATELESS ROUTING (S-GPSR) GPSR scans its neighborhood table to retrieve the next hop which is optimal and leads to the destination, during packet transmission to a known host. As there may be more than one such hop available, GPSR selects an adjacent neighbor that has the least distance to a p articular destination. In S-GPSR, the trust levels used in conjunction with the geographical distances are incorporated in the neighborhood table to create the most trusted distance route rather than the default min imal distance To compute direct trust in a node, an effort-return based trust model is used . The accuracy and sincerity of immediate neighboring nodes is ensured by observing their contribution to packet forwarding mechanis m. To imp lement the trust derivation mechanism, Trust Update Interval (TUI) of each forwarded packet is buffered in the node as (GPSR Agent::buffer packet). The TUI is a very critical co mponent of such a trust model. It determines the time a node should wait before assigning a trust or distrust level to a node based upon the results of a particular event. After transmission, each node promiscuously listens for the neighboring node to forward the packet. If neighbor forwards the packet in proper manner within the TUI, its corresponding trust level is incremented. However, if the neighboring node modifies the packet in an unexpected manner or does not forward the packet at all, its trust level is decremented. Every time a node transmits a data or control packet, it immediately brings its receiver into pro miscuous mode (GPSR Agent::tap), so as to overhear its immediate neighbor forwarding the packet . The sending node verifies the different fields in the forwarded IP packet for requisite modifications through a sequence of integrity checks (GPSR Agent::verify packet integrity). If the integrity checks succeed, it confirms that the node has acted in a benevolent manner and so its direct trust counter is incremented. On the other hand, if the integrity checkfails or the forward ing node does not transmit the packet at all, then its corre sponding direct trust measure is decremented so that the node is treated as malicious node. The S-GPSR is explained by using flow chart which is illustrated through Figure 3. 4. Enhanced Greedy Perimeter Stateless Routing (E-GPSR) In the basic GPSR method, it scans its neighborhood table to retrieve the next hop which is optimal and leads to the destination during packets transmission or data transmission to known host. As there may be more than one such hop available , GPSR selects an adjacent neighbor that has the least distance to a particular destination. In contrast to GPSR , Secured greedy perimeter stateless routing (S-GPSR) introduced the concept of trust level wh ich resulted a more secured routing over a geographical area or over a location bas ed routing. But again S-GPSR lacked in terms of efficiency as a common o r constant trust update interval for several nodes may be troublesome in case of heavy traffic. Efficient greedy perimeter stateless routing (E-GPSR) introduces the concept of “OBSERVATION TIM E (OT)” for each node separately in addition to the trust level. Both these Observation time (OT) and Trust level (TLC) is incorporated in the neighborhood table to established the most trusted distance route rather than the default min imal distance which not optimu m distance. To compute direct www.theijes.com The IJES Page 101
  • 5. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) trust and an optimal next node‟s address , an effort return based model is used . The mechanism proves to be more efficient as the analysis is being observed on the basis of the accurate and sincere contribution of the immed iate neighbor nodes. The whole mechanism o f generating the secure, trust base and efficient model consist of two major steps: 1. Generation of Observation time fo r each node. 2. Trusted route selection 4.1 GEN EARTION OF OBS ERVATION TIME FOR EACH NODE: Since the trust level count (TLC) , fo r each node that forwards a packet is initialized ,at the same t ime the “ Observation Time” of each node is maintained ,wh ich is calcu lated on the acc ount of the buffered forwarded data packets in the node ( GPSR Agent :: buffer packet ). The Observation Time is very critical and impo rtant measure for efficient routing. It determines the time that a node takes to decide a most trusted and minimal route rather than a default minimal distance. The Observation time counter (OTC) is maintained by the observation of the neighboring nodes. The Observation Time Counter (OTC) field is updated by the monitoring of the average packet fo rwarding delay. Each t ime, if the packet is forwarded within the Observation Time the POSITIVE TRUST is generated for the particular node, else the NEGATIVE TRUST is generated for the Forwarding node 4.2 .TRUS TED ROUTE S EL ECTION Whenever a packet is to be forwarded a best and optimal node is to be selected. The selection of the trusted node is done on the basis of the TRUST COUNT for each nodes. A node with best TRUST COUNT is selected as the next node to be forward the packet along with the optimal minimu m distance. Every t ime a node transmits a data packet within an OBSERVATION TIM E , its neighbors overhears it immediately (forwarding packet) . The sending node verifies the different field in the forwarded IP packets and check for integrity. If the integrity check succeeds, it confirms that the node has acted in a benevolent manner. www.theijes.com The IJES Page 102
  • 6. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) 5. Simulation Results The trust and the mobility model is imp lemented in the existing S-GPSR protocol to obtain Enhanced GPSR protocol. The E-GPSR protocol is simulated using OPNET 14.0 to emulate selective forwarding and Sybil attacks in mobile sensor networks. The network animator outputs for 100 nodes with 10 malicious nodes. The performance parameters such as delay, packet dropped, routing traffic received and traffic sent and received bits/ sec and packets/ sec is calculated. SIMULATION PARAMETRS VALUES No. Of Nodes 100-150 Graphical Area 100X 100 m Packet Size 512 Traffic Type CBR No . of Malicious Nodes 5 to 25 Simulati on Time 100 s Fig : Total traffic sent in case of selecti ve forwarding and E-GPRS method and S-GPRS Fig : total packets dropped in case of selective forwarding attack www.theijes.com The IJES Page 103
  • 7. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) Fig : total del ay in case of Selective Forwarding attack Fig : total traffic sent in case of Sybil attack Fig : packets dropped i n case of S ybil attack Fig :Total del ay in case of Sybil attack www.theijes.com The IJES Page 104
  • 8. Enhanced Greedy Perimeter Stateless Routing Protocol (E-GPSR) 6. Conclusion Enhanced greedy perimeter stateless routing protocol is implemented for mobile sensor network with different coverage area considering 100 and 150 number of nodes for simu lation. It is compared with secured greedy perimeter stateless routing protocol for different nu mber of malicious nodes. The results show that on the average, the routing overhead achieved using the E-GPSR protocol was 7o% less than the standard S-GPSR protocol. Further more, an imp rovement of 25% in the delivery rat io have been achieved in the E-GPSR protocol. The improvement in the above mentioned network performance is mainly due to smaller trust values, shorter routing decisions and less number of control packets taken by the trust based model imp lemented in GPSR to get rid of the attackers. REFERENCES : [1] C.Karlof & D.Wagner, (2003) “Secure routing in wireless sensor networks: Attacks & countermeasures”, Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols & Applications, Anchorage, AK, pp.113-127. [2] S.Carter & A.Yasinac, Y.C.Hu, (2002) “Secure position aided ad -hoc routing protocol”, Proceedings of the IASTED Conference on Co mmunications & Co mputer Networks (CCN), Cambridge, MA, USA, pp.329-324. [3] Y.C.Hu, A.Perrig & DB.Johnson,(2002) “Ariadne: A secure on-demand routing protocol for adhoc networks”, Proceedings of the Eighth Annual International Conference on Mobile Co mputing & Networking (MobiCo m), At lanta, Georgia, USA, pp.12-23. [4] B.Dahill, B.N.Levine, E.Royer & C.Shields, (2002) “A secure routing protocol for ad-hoc networks”, Proceedings of the IEEE International Conference on Network Protocols (ICNP), Paris, France, pp.78-87. [5] Adrian Perrig & Robert Szewczy k, Victor Wen, Dav id Culler & J.D.Tygar,(2001) “SPINS: Security Protocols for Sensor Netwo rks”, Proceedings of ACM Seventh Annual International Conference on Mobile Co mputing & Networking, Ro me, Italy, pp.189-199. [6] W.Stallings, (2000) Network Security Essentials , Prentice Hall. [7] Asad Amir Pirzada & Chris McDonald, (2005) “Circu mventing sinkholes & wormholes in wireless sensor networks”, Proceedings of 2nd IEEE International Workshop on Wireless Ad-hoc Networking, Colu mbus, USA, pp.132-150. [8] Jamal N.Al-Karaki and Ahmed E.Kamal, (2004) “Routing Techniq ues in Wireless Sensor Networks: A Survey”, IEEE Transactions on Wireless Co mmunication, Vol. 11, No.6, pp.6-20. [9] Brad Karp & H.T.Kung, (2000) “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Proceedings of Sixth Annual International Conference on Mobile Co mputing & Networking, Boston, pp.243-254. [10] A.Pirzada & C.McDonald, (2004) “Establishing trust in pure ad -hoc networks”, Proceedings of 27th Australasian Co mputer Science Conference (ACSC), Dunedin, New Zealand, Vol. 26, No.1, pp.47-54. [11] Asad Amir Pirzada & Chris McDonald, (2007) “Trusted greedy perimeter stateless routing”, Proceedings of 15th IEEE International Conference on Networks (ICON 2007), Adelaide, Australia, pp.206-211. www.theijes.com The IJES Page 105