Wireless sensor networks- part II: routing protocols and security issues

Wireless sensor networks (WSNs) have a wide range of invaluable civil and military applications. Nodes in WSNs act as information sources, sensing and collecting data samples from their environment. They perform routing functions, creating multi-hop wireless networking fabric that conveys data samples to other sensor nodes. A number of important performance measures have to be considered in designing WSN. Among these, energy efficiency and adaptive medium access control (MAC) and scalability. In part II of this series, we present a review of different routing techniques and security issues. We limit our coverage in this paper to network structure based routing classification. Discussed also are the WSNs security requirements. In addition, we present a number of secure routing algorithms for WSNs

[1]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Frank Kargl,et al.  Securing ad hoc routing protocols , 2004 .

[4]  Stephan Olariu,et al.  Information assurance in wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[5]  Joseph Polastre,et al.  Algorithm for Robust Routing in Volatile Environments , 2003 .

[6]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[7]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[8]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[9]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..