Secure Multipath routing in Wireless Sensor Networks

Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper we have explored general security threats in wireless sensor network and made an extensive study to categorize available data gathering protocols and analyze possible security threats on them. Due to limitations of sensor devices, the networks exposed to various kinds of attacks and conventional defenses against these attacks are not suitable due to the resource constrained nature of these kinds of networks. Therefore, security in WSNs is a challenging task due to inheritance limitations of sensors and it becomes a good topic for researchers. In this paper we focus at secure routing protocols in wireless sensor networks and surveyed nineteen papers which focusing on this matter. We represent their problems and methodologies which are used in order to address the problems

[1]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Srdjan Capkun,et al.  Secure time synchronization service for sensor networks , 2005, WiSe '05.

[4]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[5]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[6]  Levente Buttyán,et al.  A taxonomy of routing protocols for wireless sensor networks , 2007 .

[7]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[8]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[9]  Sanjay Kumar Madria,et al.  SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.

[10]  Joseph Migga Kizza A Guide to Computer Network Security , 2009, Computer Communications and Networks.

[11]  YangYang,et al.  Wireless sensor and actuator networks , 2010 .