Defending Wireless Network using Randomized Routing Process

Download Now
Provided by: Creative Commons
Topic: Enterprise Software
Format: PDF
Wireless Network (WN) challenges in the transmission of data are its network traffic and network security. Another issue in network is Compromised node and Denial-of-Service attack (DoS). Multipath routing algorithms are vulnerable to these attacks. A key management scheme is used with this routing algorithm to generate randomized multipath routes for secure transmission of data to the sink. The authors adopt Shamir's algorithm for efficient key management which is scalable, highly secure and decreases communication overhead.
Download Now

Find By Topic