Kanchu Bhaskar Rao, Udaya Kumar Nanubala


Wireless sensor network (WSN) is deployed there's frequently essential to update buggy old small programs or parameters stored within the sensor nodes. This can be frequently frequently accomplished when using the data discovery and distribution protocol, which facilities and origin to inject small programs, instructions, queries and configuration parameters to sensor nodes. A data discovery and distribution protocol for wireless sensor systems (WSNs) 's upgrading configuration parameters of, and disbursing management instructions to, the sensor nodes. All existing data discovery and distribution techniques are stricken by two drawbacks. First, they are because of the centralized approach only the base station can distribute data item. This kind of approach is not suitable for emergent multiword-multi-user WSNs. Second, people techniques were not created using reassurance in your ideas and for that reason competitors can easily launch attacks to harm the network. This paper proposes the first secure and distributed data discovery and distribution protocol named (DiDrip). Several of these disposable sensors might be networked in several programs that require unwatched methods. A Concealed Sensor Network (WSN) includes 100s or many people sensor nodes.


Wireless Sensor Network (WSN); Data Discovery; Disposable Sensors;


G. Tolle and D. Culler, “Design of an application-cooperative management system for wireless sensor networks,” in Proc. Eur. Conf. Wireless Sensor Netw., 2005, pp. 121–132.

K. Lin and P. Levis, “Data discovery and dissemination with DIP,” in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 433–444.

P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulating algorithm for code maintenance and propagation in wireless sensor networks,” in Proc. 1st Conf. Symp. Netw. Syst. Design Implementation, 2004, pp. 15–28. [4] A. Perrig, R. Canetti, D. Song, and J. Tygar, “Efficient and secure source authentication for multicast,” in Proc. Netw. Distrib.

M. Bellare and P. Rogaway, “Collision-resistant hashing: Towards making UOWHFs practical,” in Proc. Adv. Cryptology, 1997, pp. 56–73.

A. Perrig, R. Canetti, J. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Proc. IEEE Security Privacy, 2000, pp. 56–73.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at