New Trends in Secure Routing Protocols for Wireless Sensor Networks

Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding, wormhole, Hello flood, and replication attacks. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against these attacks while efficiently utilizing the energy of the deployed nodes has become imperative. Several routing protocols have been proposed in the literature for WSNs. Most of these protocols assume static nodes and sinks to collect data from network fields. However, they may be highly movable, and recent advances show that mobile sensors in WSNs have a promising performance. Therefore, this paper surveys the state of the art on routing protocols related to WSNs and presents the security issues or problems associated with the current protocols as well as discusses the future trends and open research issues on secure routing protocols of WSNs.

[1]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[2]  Jonathan Loo,et al.  Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks , 2008, J. Digit. Content Technol. its Appl..

[3]  M. Azim,et al.  A Dual-Sink Secure Routing Protocol for Wireless Sensor Networks , 2012 .

[4]  Emanuel Melachrinoudis,et al.  Controlled sink mobility for prolonging wireless sensor networks lifetime , 2008, Wirel. Networks.

[5]  Ian F. Akyildiz,et al.  A survey on wireless multimedia sensor networks , 2007, Comput. Networks.

[6]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[7]  Loukas Lazos,et al.  Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[8]  Zhongming Zheng,et al.  Secure and Energy-Efficient Disjoint Multipath Routing for WSNs , 2012, IEEE Transactions on Vehicular Technology.

[9]  Monica R Mundada,et al.  A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS , 2012 .

[10]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[11]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[12]  Othman Ibrahim,et al.  Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.

[13]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[14]  Jiliang Zhou,et al.  An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network , 2008, 2008 International Conference on Information and Automation.

[15]  Lovepreet Kaur,et al.  Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2014 .

[16]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[17]  Weijia Li,et al.  An authentication scheme for locating compromised sensor nodes in WSNs , 2010, J. Netw. Comput. Appl..

[18]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[19]  Rabi N. Mahapatra,et al.  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[20]  Bechir Hamdaoui,et al.  A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks , 2012, IEEE Communications Surveys & Tutorials.

[21]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[22]  Jun Zheng,et al.  Wireless Sensor Networks: A Networking Perspective , 2009 .

[23]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[24]  Weili Wu,et al.  Wireless Sensor Networks and Applications , 2008 .

[25]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[26]  C. Chellappan,et al.  Semi-randomised propagation for secure routing in Wireless Sensor Networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[27]  Zhong Chen,et al.  A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks , 2010, J. Networks.

[28]  Ivan Stojmenovic,et al.  Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.

[29]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[30]  Donggang Liu,et al.  Broadcast Authentication and Key Management for Secure Sensor Networks , 2005, Handbook of Sensor Networks.

[31]  LooJonathan,et al.  Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks , 2012 .

[32]  Mohamed Mostafa A. Azim,et al.  MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks , 2010 .

[33]  By David Culler Secure , low-power , IP-based connectivity with IEEE 802 . 15 . 4 wireless networks , 2007 .

[34]  Hamid K. Aghajan,et al.  Application Development in Vision-Enabled Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[35]  Yuan-xi Jiang,et al.  A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[36]  Jonathan Loo,et al.  Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks , 2012, Wirel. Pers. Commun..

[37]  Mohammed Atiquzzaman,et al.  Wireless sensor network for aircraft health monitoring , 2004, First International Conference on Broadband Networks.

[38]  Debao Xiao,et al.  Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.

[39]  Rachelin Sujae Packet Hiding Methods for Preventing Selective Jamming Attacks , 2013 .

[40]  S. Radhakrishnan,et al.  Multiple Secret Keys based Security for Wireless Sensor Networks , 2012, Int. J. Commun. Networks Inf. Secur..

[41]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[42]  Bo Peng,et al.  Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks , 2012, Int. J. Commun. Networks Inf. Secur..

[43]  Alpesh R. Sankaliya,et al.  PEGASIS : Power-Efficient Gathering in Sensor Information Systems , 2015 .

[44]  Hung-Yu Chien Tree-Based Matched RFID Yoking Making It More Practical and Efficient , 2009 .

[45]  K. Suganthi,et al.  Improving energy efficiency and reliability using multiple mobile sinks and hierarchical clustering in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[46]  Donggang Liu,et al.  Using Auxiliary Sensors for Pairwise Key Establishment in WSN , 2012, TECS.

[47]  Geoff Mulligan,et al.  The 6LoWPAN architecture , 2007, EmNets '07.

[48]  Yuanyuan Yang,et al.  Data gathering in wireless sensor networks with mobile collectors , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[49]  Shafiullah Khan,et al.  Cross Layer Design for Routing and Security in Multi-hop Wireless Networks , 2009 .

[50]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[51]  V. Gupta,et al.  Security threats in sensor network and their possible solutions , 2012, 2012 International Symposium on Instrumentation & Measurement, Sensor Network and Automation (IMSNA).

[52]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[53]  S.A. Khan,et al.  Analyzing & Enhancing energy Efficient Communication Protocol for Wireless Micro-sensor Networks , 2005, 2005 International Conference on Information and Communication Technologies.

[54]  Jonathan Loo,et al.  Secure route selection in wireless mesh networks , 2012, Comput. Networks.

[55]  Yang Xiang,et al.  Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2011 .

[56]  Aly M. El-Semary Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and üTesla forWireless Sensor Networks. , 2012 .

[57]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[58]  R. J. D'Souza,et al.  Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks , 2012, IEEE Sensors Journal.

[59]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[60]  Yogesh Chaba,et al.  An IPC key management scheme for Wireless Sensor Network , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[61]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[62]  Mohamed Mostafa A. Azim MAP: Energy Efficient Routing Protocol for Wireless Sensor Networks , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.

[63]  Md. Rafiqul Islam,et al.  A Study on the Security Issues in WSN , 2012 .

[64]  Deborah Estrin,et al.  Rumor Routing Algorithm For Sensor Networks , 2002 .

[65]  Mohamed Mostafa Abdel-Azim,et al.  Path energy weight: A global energy-aware routing protocol for wireless sensor networks , 2010, 2010 IFIP Wireless Days.

[66]  Jonathan Loo,et al.  SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks , 2010, Journal of Network and Systems Management.

[67]  Elfed Lewis,et al.  Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.

[68]  Alicia Triviño-Cabrera Survey on Opportunistic Routing in Multihop Wireless Networks , 2011, Int. J. Commun. Networks Inf. Secur..

[69]  Satyajayant Misra Reviews of "multi-gigabit microwave and milimeter-wave wireless communication" (wells, j.; 2010) and "wireless sensor networks: a networking perspective" (zheng, j. and jamalipour, a.; 2009) [book reviews] , 2012, IEEE Wireless Communications.

[70]  Xin Yang,et al.  SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Computers.

[71]  Albert Y. Zomaya,et al.  Security Issues and Countermeasures in Wireless Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.

[72]  Shao-Shan Chiang,et al.  A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks , 2007, IEEE Transactions on Consumer Electronics.

[73]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[74]  Hongliang Ren,et al.  Physiological information acquisition through wireless biomedical sensor networks , 2005, 2005 IEEE International Conference on Information Acquisition.