Secure routing through refining reliability for WSN against DOS attacks using AODSD2V2 algorithm for AMI

Citations of this article
Mendeley users who have this article in their library.
Get full text


Secure and reliable routing expands the performance of wireless communication infrastructure of the Advanced Metering Infrastructure (AMI).This paper tries to deliver reliable routing using combination of AODV(Reactive type protocol) and DSDV(proactive type protocol) protocol considering WSN. Different kinds of Attack annoys the enactment of communication infrastructure of AMI. This paper defends communication infrastructure from DoS (Denial of service) attack. The main aim of this paper try to provide reliable routing with security. Communication infrastructure is a key element of AMI. Providing reliability and security for communication infrastructure we can improve the performance of AMI. Due to this electricity sector can save millions of dollars and we provide social awareness about importance of electricity security or Smart Grid. This paper calculates the security in terms of delay, energy consumption, throughput, PDR (Packet Delivery Ratio) and overhead. By considering these parameters we will calculate Confidentiality, Integrity, Availability and Accountability (non-repudiation). Wireless Sensor Network (WSN) considered for wireless communication infrastructure for the AMI. Sensor nodes are battered for attack. Intended for AODSD2V2 (Ad Hoc on Demand Destination Sequenced Distance Vector Routing Protocol) protects the data packets from malicious nodes and DoS attack. For the WSN network infrastructure two kinds of topologies are considered 1. Random deployment strategy 2. Grid deployment. Network Simulator2 (NS2) delivers comparatively simulation results intended for the calculation of reliability and security.

Author supplied keywords




Halle, P. D., & Shiyamala, S. (2019). Secure routing through refining reliability for WSN against DOS attacks using AODSD2V2 algorithm for AMI. International Journal of Innovative Technology and Exploring Engineering, 8(10), 282–289.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free