Security Improvement of Dropper Elimination Scheme for IoT Based Wireless Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2017 by IJETT Journal
Volume-45 Number-3
Year of Publication : 2017
Authors : Ms.M.sudha, Mr.D.Saravanan, Mrs.S.Usharani
DOI :  10.14445/22315381/IJETT-V45P229


Ms.M.sudha, Mr.D.Saravanan, Mrs.S.Usharani " Security Improvement of Dropper Elimination Scheme for IoT Based Wireless Networks ", International Journal of Engineering Trends and Technology (IJETT), V45(3),132-135 March 2017. ISSN:2231-5381. published by seventh sense research group

Eliminate the eavesdropper collusion occurred by the two or more devices communicating via optimal relay with centralized router using IOT network. The overall delay is reduced with increase in throughput. This paper studies the important of Received signal strength of wireless communication under eavesdropper collusion where detecting the malicious node. To provide knowledge about the security improvement in wireless communication network by using RSS algorithm.


[1]. C.Perkins, IOT networking, Addison-Wesley, 2000.
[2]. J. Sun, Mobile IOT networking: an essential technology for pervasive computing. Proceedings of International Conferences on Infotech& Infonet, Beijing, China, C: p. 316–321.
[3]. M. Bansal, R. Rajput, and G. Gupta, Mobile IOT networking (MANET): routing protocol performance issues and evaluation considerations.Mobile IOT Network (MANET) Working Group, IETF (1998).
[4]. H. Yang, H. Luo, F. Ye, S. Lu, et. al., Security in mobile IOT networks: challenges and solutions. IEEE Wireless Communications,2004. 11(1): p. 38-47.
[5]. M. Lasermann, Characterizing MANET topologies and analyzing their impact on routing protocols. Diploma Thesis,Stuttgart University, Germany, 2002.
[6]. C.Perkins and P. Bhagwat. Highly dynamic destination- sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM `94 Conference on Communications, Architectures, Protocols, and Applications,(London, UK, Sept. 1994), p. 234-244.
[7]. C.Adjih, A.Laouiti, P.Minet, et. al. Optimized link state routing protocol. Work in Progress, IETF draft, MANET Working Group,INRIARocquencourt, France, 2003.
[8]. C .Perkins and E. Royer. IOT on-demand distance vector routing. In Workshop on Mobile Computing and Systems Applications,1999.
[9]. D. Johnson and D. Maltz, Dynamic Source Routing in IOT wireless networks. In Mobile computing, T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers, 1996: Ch. 5, p. 153-181.
[10]. A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, ?Principles of physical layer security in multiuser wireless networks: Asurvey,? IEEE Commun. Surveys Tuts, vol. 16, no. 3, pp. 1550– 1573, 2014.
[11]. X. He and A. Yener, ?Two-hop secure communication using an untrusted relay,? EURASIP J. Wireless Commun. Netw., vol. 2009, pp.1–13, May 2009
[12]. G. Geraci, S. Singh, J. Andrews, J. Yuan, and I. Collings, ?Secrecyrates in broadcast channels with confidential messages and external eavesdroppers,? IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2931–2943, May 2014.
[13]. M Khandakerand K.-K. Wong, ?Masked beam forming in the presence of energy-harvesting eavesdroppers,? IEEE Trans. Inf. Forensics Security,vol. 10, no. 1, pp. 40–54, 2015.
[14] C. Wang, H. Wang, D. Ng, X. Xia, and C. Liu, ?Joint beam formingand power allocation for secrecy in peer-to-peer relay networks,? IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3280– 3293, Jun. 2015.
[15] S. Vasudevan, S. Adams, D.Goeckel, Z. Ding, D. Towsley, and K.Leung, ?Multi-user diversity for secrecy in wireless networks,? in Proc. IEEE ITA, Jan. 2010, pp. 1–9.
[16] J. Zhang, L. Fu, and X. Wang, ?Asymptotic analysis on secrecy capacity in large-scale wireless networks,? IEEE/ACM Trans. Netw., vol. 22, no. 1, pp. 66–79, Feb. 2014.
[17] M. Mirmohseni and P. Papadimitratos, ?Scaling laws for secrecy capacity in cooperative wireless networks,? in Proc. IEEE INFOCOM, Apr. 2014, pp. 1527–1535.
[18] T.Yang, G. Mao, and W. Zhang, ?Connectivity of wireless information theoretic secure networks,? in Proc IEEE GLOBECOM, Dec. 2014, pp. 317–323.

Security, Internet of Things, Eavesdropper collusion, Received Signal Strength (RSS).