We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Review on the Research Evolution on Secure Routing in Wireless Sensor Network

by Nasreen Fathima
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 17
Year of Publication: 2015
Authors: Nasreen Fathima
10.5120/21161-4216

Nasreen Fathima . Review on the Research Evolution on Secure Routing in Wireless Sensor Network. International Journal of Computer Applications. 119, 17 ( June 2015), 34-40. DOI=10.5120/21161-4216

@article{ 10.5120/21161-4216,
author = { Nasreen Fathima },
title = { Review on the Research Evolution on Secure Routing in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 17 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number17/21161-4216/ },
doi = { 10.5120/21161-4216 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:04:19.574836+05:30
%A Nasreen Fathima
%T Review on the Research Evolution on Secure Routing in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 17
%P 34-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in routing mechanisms of Wireless Sensor Network (WSN) has become a key aspect of the current research fields where various security issues due to vulnerable attacks in WSN drag the attention of many researchers. This study is intended to investigate some of the existing secure routing techniques for WSN and emphasizes on the existing efficient secure routing techniques. Inferrencing has been done to evaluate the performance efficiency, limitations and the advantages of the different types of existing secure routing techniques. This paper focuses on the state-of-art study of the existing surveys and presents technologies which are emphasized on designing robustness and computationally efficient techniques for secure routing in WSN. This paper also discusses some of the most important and significant findings as well as a brief illustration of research gap for various robust and computational efficient secure routing techniques in the area of WSN, in addition the description of a set of gaps and recommendations will be helpful for future direction of research.

References
  1. Krco, S. ; Tsiatsis, V. ; Matusikova, K. ; Johansson, M. ; Cubic, I. ; Glitho, R. 2007. Mobile Network Supported Wireless Sensor Network Services. Mobile Adhoc and Sensor Systems, MASS, IEEE International Conference, pp. -3
  2. Modares, H. ; Salleh, R. ; Moravejosharieh, A. 2011. Overview of Security Issues in Wireless Sensor Networks. Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference, pp. 308-311
  3. Rout, R. R. ; Ghosh, S. K. ; Chakrabarti, S. 2010. A Network Coding based Probabilistic Routing scheme for Wireless Sensor Network. Wireless Communication and Sensor Networks (WCSN), Sixth International Conference, pp. 1-6, 15-19
  4. Sutar, U. S. ; Bodhe, S. K. 2010. Energy efficient topology control algorithm for multi-hop ad-hoc wireless sensor network. Computer Science and Information Technology (ICCSIT), 3rd IEEE International Conference, pp. 418-421
  5. Mittal, R. ; Bhatia, M. P. S. 2010. Wireless sensor networks for monitoring the environmental activities. Computational Intelligence and Computing Research (ICCIC), IEEE International Conference, pp. 1-5
  6. Soo-Hwan Choi; Byung-Kug Kim; Jinwoo Park; Chul-Hee Kang; Doo-Seop Eom. 2004. An implementation of wireless sensor network," Consumer Electronics, IEEE Transactions, Vol. 50, No. 1, pp. 236-244
  7. Nagrath, P. ; Gupta, B. 2011. Wormhole attacks in wireless adhoc networks and their counter measurements: A survey," Electronics Computer Technology (ICECT), 2011 3rd International Conference, Vol. 6, pp. 245-250
  8. Terence, J. S. 2011. Secure route discovery against wormhole attacks in sensor networks using mobile agents, Trendz in Information Sciences and Computing (TISC), 2011 3rd International Conference pp. 110-115
  9. Gelenbe, E. ; Gorbil, G. ; Fang-Jing Wu. 2012. Emergency Cyber-Physical-Human Systems. Computer Communications and Networks (ICCCN), 1st International Conference, pp. 1-7
  10. AlMheiri, S. M. ; AlQamzi, H. S. 2013. Data link layer security protocols in Wireless Sensor Networks: A survey. Networking, Sensing and Control (ICNSC), 10th IEEE International Conference, pp. 312-317
  11. Wei-Chia Lai; Ying-Ying Su; Chih-Ming Lee; Shih-Hau Fang; Wan-Jung Lin; Xu-Peng He; Kun-Chi Feng. 2013. A survey of secure fingerprinting localization in wireless local area networks. Machine Learning and Cybernetics (ICMLC), 2013 International Conference, Vol. 03, pp. 1413-1417
  12. Sowmya, S. ; Malarchelvi, P. D. S. K. 2014. A survey of jamming attack prevention techniques in wireless networks. Information Communication and Embedded Systems (ICICES), 2014 International Conference, pp. 1-4
  13. Dhanalakshmi, T. G. ; Bharathi, N. ; Monisha, M. 2014. Safety concerns of Sybil attack in WSN," Science Engineering and Management Research (ICSEMR), International Conference, pp. 1-4
  14. Ali Alheeti, K. M. ; Ehsan, S. ; McDonald-Maier, K. D. 2014. An Assessment of Recent Attacks on Specific Embedded Systems. Emerging Security Technologies (EST), 2014 Fifth International Conference, pp. 88-93
  15. Autkar, Shriya V. ; Dhage, M. R. ; Bholane, S. P. 2015. A survey on distributed techniques for detection of node clones in Wireless Sensor Networks. Pervasive Computing (ICPC), 2015 International Conference, pp. 1-4
  16. Liu, A. , Zheng, Z. , Zhang, C. , Chen, Z. , Shen, X. 2012. Secure and Energy-Efficient Disjoint Multipath Routing for WSNs. Vehicular Technology, IEEE Transactions, Vol. 61, No. 7, pp. 3255-3265
  17. Saleem, K. , Fisal, N. , Muhtadi, A. 2014. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol. Sensors Journal, IEEE, Vol. 14, No. 7, pp. 2232-2239
  18. Ganesh, S. , Amutha, R. 2013. Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. Communications and Networks, Journal, Vol. 15, No. 4, pp. 422- 429
  19. Ruj, S. , Nayak, A. , Stojmenovic, I. 2013. Pair wise and Triple Key Distribution in Wireless Sensor Networks with Applications. Computers, IEEE Transactions, Vol. 62, No. 11, pp. 2224-2237
  20. Duan, J. , Gao, D. , Yang, D. , Foh, C. H. , Hen, H-H. 2014. An Energy-Aware Trust Derivation Scheme with Game Theoretic Approach in Wireless Sensor Networks for IoT Applications. Internet of Things Journal, Vol. 1, No. 1, pp. 58-69
  21. Wenjun, G. , Dutta, N. , Chellappan, S. , Bai, X. 2011. Providing End-to-End Secure Communications in Wireless Sensor Networks. Network and Service Management, IEEE Transactions, Vol. 8, No. 3, pp. 205-218
  22. Guoxing, Z. , Shi, W. , Deng, J. 2012. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. Dependable and Secure Computing, IEEE Transactions, Vol. 9, No. 2, pp. 184-197
  23. Lazos, L. , Poovendran, R. 2006. HiRLoc: high-resolution robust localization for wireless sensor networks. Selected Areas in Communications, IEEE Journal, Vol. 24, No. 2, pp. 233-246
  24. Shancang, L. , Zhao, S. , Wang, X. , Zhang, K. , Li, L. 2014. Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks, Systems Journal, IEEE , Vol. 8, No. 3, pp. 858-867
  25. Uluagac, S. , Beyah, R. A. , Copeland, J. A. 2013. Secure Source-Based Loose Synchronization (SOBAS) for Wireless Sensor Networks. Parallel and Distributed Systems, IEEE Transaction, Vol. 24, No. 4, pp. 803-813
Index Terms

Computer Science
Information Sciences

Keywords

Robustness and Computational efficiency Wireless Sensor Network Secure Routing Techniques