Enhanced technique for secure wireless sensor routing with respect to energy conservation

Maqsood Mahmud*, Abdulrahman Abdulkarim Mirza, Ihsan Ullah, Naveed Khan, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a routing protocol architecture based on recursive group algorithm. This algorithm apply Group Verification Tree approach which makes the sensor network secure and make it safer from malicious intrusions and illegitimate users. The proposed approach will give a new dimension to the fast and secure routing in the sensor networks with less energy to be consumed. Based on the analysis and simulation the proposed strategies yield better results than the existing results.

Original languageEnglish
Title of host publicationFuture Generation Information Technology - Second International Conference, FGIT 2010, Proceedings
Pages376-382
Number of pages7
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2nd International Mega-Conference on Future Generation Information Technology, FGIT 2010 - Jeju Island, Korea, Republic of
Duration: 13 Dec 201015 Dec 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6485 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Mega-Conference on Future Generation Information Technology, FGIT 2010
Country/TerritoryKorea, Republic of
CityJeju Island
Period13/12/201015/12/2010

Bibliographical note

Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.

Keywords

  • Group Verification Tree
  • Malicious
  • Routing Protocol
  • Wireless Sensor Networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Enhanced technique for secure wireless sensor routing with respect to energy conservation'. Together they form a unique fingerprint.

Cite this