A survey on secure hierarchical routing protocols in wireless sensor networks

WSNs usually deployed in the targeted area to monitor or sense the environment and depending upon the application sensor node transmit the data to the base station. To relay the data intermediate nodes communicate together, select appropriate routing path and transmit data towards the base station. Routing path selection depends on the routing protocol of the network. Base station should receive unaltered and fresh data. To fulfill this requirement, routing protocol should beenergy-efficient and secure. Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols. In this paper, we study different hierarchical routing technique for WSNs. Further we analyze and compare secure hierarchical routing protocols based on various criteria.

[1]  Wu Jie,et al.  EECS:an energy-efficient clustering scheme in wireless sensor networks , 2007 .

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[4]  I. Mahgoub,et al.  A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[5]  Antonio Alfredo Ferreira Loureiro,et al.  LHA-SP: secure protocols for hierarchical wireless sensor networks , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[6]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[7]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[8]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[9]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[10]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[11]  Young-Ju Han,et al.  The Concentric Clustering Scheme for Efficient Energy Consumption in the PEGASIS , 2007, The 9th International Conference on Advanced Communication Technology.

[12]  Quan Zhou,et al.  Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks , 2009, 2009 First International Conference on Information Science and Engineering.

[13]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[14]  Jing Chen,et al.  An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).

[15]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[16]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[17]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[18]  D.P. Agrawal,et al.  APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[19]  Rasim M. Alguliev,et al.  Hierarchical routing in wireless sensor networks: a survey , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[20]  Gang Hu,et al.  Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[21]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[22]  V. Loscri,et al.  A two-levels hierarchy for low-energy adaptive clustering hierarchy (TL-LEACH) , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[23]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[24]  Jae-Young Pyun,et al.  Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[25]  R. Srinivasan,et al.  AC: Cluster Based Secure Routing Protocol for WSN , 2007, International Conference on Networking and Services (ICNS '07).

[26]  Geng Yang,et al.  NHRPA: a novel hierarchical routing protocol algorithm for wireless sensor networks , 2008 .