All Title Author
Keywords Abstract

GSTP: Geographic Secured Two Phase Routing Using MD5 Algorithm

DOI: 10.4236/cs.2016.78159, PP. 1845-1855

Keywords: GSTP, MD5, MAC, Security, Routing, WMSN

Full-Text   Cite this paper   Add to My Lib


Secured Two Phase Geographic Greedy Forwarding (SecuTPGF) is a geographic greedy forwarding?protocol for transmitting multimedia data stream in Wireless Multimedia Sensor Networks?(WMSN) in a secure and reliable manner. Cryptographic and MAC authentication mechanisms are used to implement security for both node and message authentication. In this paper, a modified?version of SecuTPGF, the GSTP routing provides security for both node and message authentication by using MD5 algorithm with a reduced computation power. In SecuTPGF, two different algorithms are used for node and message authentication, and GSTP routing uses “MD5Algorithm” for both node and message authentication. Using MD5 algorithm for node and message authentication, the average number of transmission paths increased and average number of hops used for transmission decreased when compared to the?SecuTPGF. By conducting security analysis & evaluation experiments, the effectiveness of GSTP routing algorithm is proved.


[1]  Shu, L., Zhang, Y., Yang, L.T., Wang, Y., Hauswirth, M. and Xiong, N.X. (2010) TPGF: Geographic Routing in Wireless Multimedia Sensor Networks. Telecommunication Systems, 44, 79-95.
[2]  Mulugeta, T., Shu, L., Hauswirth, M., Chen, M., Hara, T. and Nishio, S. (2010) Secure Two Phase Geographic Forwarding Routing Protocol in Wireless Multimedia Sensor Networks. IEEE Transactions on Information Theory, 22, 644-654.
[3]  Khemapech, I., Miller, A. and Duncan, I. (2005) Simulating Wireless Sensor Networks. Technical Reports, School of Computer Science, University of St Andrews.
[4]  Shu, L., Zhang, Y., Zhou, Z., Hauswirth, M., Yu, Z. and Hynes, G. (2008) Transmitting and Gathering Streaming Data in Wireless Multimedia Sensor Networks within Expected Network Lifetime. ACM/Springer Mobile Networks and Applications (MONET), 13, 306-322.
[5]  Shu, L., Wu, C. and Hauswirth, M. (2008) NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks. Technical Report of Digital Enterprise Research Institute, July, 2008.
[6]  Shu, L., Hauswirth, M., Chao, H.-C., Chen, M. and Zhang, Y. (2011) NetTopo: A Framework of Simulation and Visualization for Wireless Sensor Networks. Ad Hoc Networks, 9, 799-820.
[7]  Kakkar, A., Singh, M.L. and Bansal, P.K. (2012) Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network. International Journal of Engineering and Technology, 2, 87-92.
[8]  Eswar Rao, K. and Naresh Kumar, K. (2012) Performance Analysis of Routing Metrics for Wireless Sensor Networks. International Journal of Modern Engineering Research, 2, 4128-4132.
[9]  Guerrero-Zapata, M., Zilan, R., Barcel-Ordinas, J., Bicakci, K. and Tavli, B. (2010) The Future of Security in Wireless Multimedia Sensor Networks. Telecommunication Systems, 45, 77-91.


comments powered by Disqus

Contact Us


微信:OALib Journal