A Survey on Measures for Secure Routing in Wireless Sensor Networks

In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas. One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments. While in last few years the routing approaches were mainly focussing on metrics such as robustness, energy preservation, etc., recently, different security solutions came to the fore that were taking also the security issues in WSNs into account. In this paper, different types of attacks on the routing layer of WSNs are investigated. Subsequently, measures for secure routing; including cryptography, key establishment, trust & reputation and secure localization; are reviewed, which were proposed by researchers in this area. Based on these findings, future prospects are discussed and final conclusions will be drawn.

[1]  Norio Nakagawa,et al.  SH4 RISC multimedia microprocessor , 1998, IEEE Micro.

[2]  Huafeng Wu,et al.  Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[3]  Javier López,et al.  Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..

[4]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[5]  Cheng Li,et al.  Joint data aggregation and encryption using Slepian-Wolf coding for clustered wireless sensor networks , 2010, Wirel. Commun. Mob. Comput..

[6]  Jun Wei,et al.  Automated Resource Management Framework for Adjusting Business Service Capability , 2007 .

[7]  Donggang Liu,et al.  Group-based key predistribution for wireless sensor networks , 2008, TOSN.

[8]  Falko Dressler,et al.  Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[9]  Richard T. Witek,et al.  StrongARM: a high-performance ARM processor , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.

[10]  Özgür Erçetin,et al.  Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario , 2007, Networking.

[11]  Ingrid Verbauwhede,et al.  Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.

[12]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[13]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[14]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[15]  Dirk Westhoff,et al.  Security Solutions for Wireless Sensor Networks , 2006 .

[16]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[17]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[18]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[19]  Mischa Dohler,et al.  A Security Framework for Routing over Low Power and Lossy Networks , 2012 .

[20]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Baohua Zhao,et al.  Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[22]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[23]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[24]  Deep Medhi,et al.  Modeling pairwise key establishment for random key predistribution in large-scale sensor networks , 2007, TNET.

[25]  Fortunato Santucci,et al.  Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[26]  Marine Minier,et al.  Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.

[27]  Huafeng Wu,et al.  Event-based Trust Framework Model in Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.

[28]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[29]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[30]  Ki-Hyung Kim,et al.  A unified security framework with three key management schemes for wireless sensor networks , 2008, Comput. Commun..

[31]  Sencun Zhu,et al.  A random perturbation-based scheme for pairwise key establishment in sensor networks , 2007, MobiHoc '07.

[32]  Elfed Lewis,et al.  Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .

[33]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[34]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[35]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[36]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[37]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[38]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[39]  Stamatis Voliotis,et al.  An energy and trust-aware routing protocol for large wireless sensor networks , 2009 .

[40]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[41]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[42]  E. Lewis,et al.  Power Management in Operating Systems for Wireless Sensor Nodes , 2007, 2007 IEEE Sensors Applications Symposium.

[43]  Jin Zhang,et al.  Curve-Based Secure Routing Algorithm for Sensor Network , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[44]  N. Fisal,et al.  Security enhancement for real-time routing protocol in wireless sensor networks , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[45]  Chun-Shien Lu,et al.  A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks , 2008, MobiHoc '08.

[46]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[47]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[48]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[49]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[50]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[51]  N. Fisal,et al.  Optimal forwarding probability for real-time routing in wireless sensor network , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[52]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[53]  Jin Zhang,et al.  Curve-Based Greedy Routing Algorithm for Sensor Networks , 2005, ICCNMC.

[54]  Hairong Qi,et al.  Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.

[55]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[56]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[57]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[58]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[59]  Deep Medhi,et al.  Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks , 2007, IEEE/ACM Transactions on Networking.

[60]  Gourab Sen Gupta,et al.  Smart Sensors and Sensing Technology , 2008 .

[61]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[62]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[63]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[64]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[65]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[66]  Young-Koo Lee,et al.  Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks , 2009, ICUIMC '09.

[67]  I. Mahgoub,et al.  A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[68]  Kyung Jun Choi,et al.  Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[69]  Eylem Ekici,et al.  Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.

[70]  Debao Xiao,et al.  Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.

[71]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..