scholarly journals Research Trends in Secure Routing Protocols and Communication System in WSNs

At present, Wireless Sensor Networks (WSNs) is fastest growing technology which extensively adopting for various application services including; weather monitoring, traffic prediction, surveillance, research and academic fields etc. As the sensor nodes are randomly deployed in wireless environment, security metrics becomes most promising challenge where communication wirelesses networks facing today. In WSNs, sensor nodes acquires various security concern i.e. vulnerabilities, threats and malicious attacks. Due to the limited resource constraints like bandwidth demand, limited memory, computational cost and minimum energy consumption of sensor nodes makes the network security protocols unachievable. In this context, this comprehensive study provides extensive review of WSNs, various challenges mainly related to security attacks and their solution strategies to strengthen the network performance. The significant contribution of this survey study is to provide the comprehensive report on standard secure routing schemes introduced in the literature and pertaining them to secure and non-secure routing protocols for strengthening the WSNs lifetime. Furthermore, the study considers the most frequently used security protocols published between 2010 to 2019, and investigates the major issues towards the security provisions in WSN, which may help for designing a futuristic routing protocol for any WSNs.

2014 ◽  
Vol 39 (2) ◽  
pp. 129-154 ◽  
Author(s):  
Ditipriya Sinha ◽  
Uma Bhattacharya ◽  
Rituparna Chaki

Abstract In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.


2021 ◽  
Vol 10 (4) ◽  
pp. 1-13
Author(s):  
Idrees Sarhan Kocher

Wireless Sensor Networks (WSN) is now an evolving technology and has a broad range of applications, such as battlefield surveillance, traffic surveillance, detection of forest fires, detection of floods, etc. The communication nature of the wireless sensor network is unprotected and dangerous due to deployment in hostile environments, restricted resources, an automatic nature, and untrusted media for broadcast transmission. For wireless sensor networks, several routing protocols have been suggested, but none of them have been developed with protection as a target. The majority function in routing algorithms currently in place for sensor networks optimize a restricted capacities in sensor nodes and the application based design of WSNs. A WSNs, however, are exposed to a number of possible threats that impede the network's regular activity. Thus, there is a strong need to provide the routing protocols of the OSI structure layer with a safe mechanism to prevent an attacker from obstructing it.   The well-known attacks against all layers are discussed in this systematic roadmap, and debilitating attacks against routing protocols are analyzed and defined in particular. Several suggested attack countermeasures, design considerations and paper contributions are also included in the routing protocols. The assertion of the study is that WSN routing protocols must be built with protection in mind, and this is the only efficient solution in WSNs for safe routing. The aim of this paper is also to provide problems, attacks and countermeasures related to protection. Finally, it is hoped that this roadmap would inspire potential researchers to come up with smarter and better protection measures and make their network safer. The first such research analysis of secure routing protocols in WSNs is this roadmap study.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2018 ◽  
Vol 7 (3.3) ◽  
pp. 279
Author(s):  
Ms Divya ◽  
Dr R. Gobinath

The secured routing protocol expresses an underlying elementary unit confide in information interchanging system. Miserably, presently no anatomy remains to supports in the layout and inquiry of secured routing protocols. This work investigates the structured approaches of secured routing and the interrelating attacker standards to contribute a structure for modeling prime protocols. Based on this anatomy, it is detected that the powerful attacks are targeting the data in the control plane. In this paper the strength of attackers are classified with respect to the locations under its direct control.  


Sign in / Sign up

Export Citation Format

Share Document