scispace - formally typeset
Open Access

Security Analysis of Routing Protocols in Wireless Sensor Networks

Reads0
Chats0
TLDR
Security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals is described.
Abstract
In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of these protocols to meet their security requirements. At last some simulation results of these protocols that have been done by their designer are mentioned.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks

TL;DR: This paper discusses about the current state-of-the-art secure LEACH schemes that are proposed in literature, and categorizes them into cryptographic-based and trust-based solutions and reviews the major development in these two categories.
Journal Article

Internet of Things Security: Layered classification of attacks and possible Countermeasures

TL;DR: A layered classification and a goal based comparison of attacks in the IoT are presented so that a better understanding of IoT attacks can be achieved and subsequently more efficient and effective techniques and procedures to combat these attacks may be developed.

A hybrid intrusion detection system based on different machine learning algorithms

TL;DR: The paper illustrates the benefit of hybrid SVM via GA and proves that by enhancing SVM with GA can reduce false alarms and mean square error (MSE) in detecting intrusion.
Journal ArticleDOI

A Cross Unequal Clustering Routing Algorithm for Sensor Network

TL;DR: Simulation experiments show that, compared with LEACH and EEUC, the proposed algorithm can effectively reduce the energy-loss of cluster heads and balance the energy consumption among all nodes in the network and improve the network lifetime.
Journal ArticleDOI

Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

TL;DR: A new version of Directed Diffusion routing protocol is presented which provides both security and energy efficiency together in wireless sensor networks.
References
More filters
Proceedings ArticleDOI

GPSR: greedy perimeter stateless routing for wireless networks

TL;DR: Greedy Perimeter Stateless Routing is presented, a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions and its scalability on densely deployed wireless networks is demonstrated.
Proceedings ArticleDOI

Directed diffusion: a scalable and robust communication paradigm for sensor networks

TL;DR: This paper explores and evaluates the use of directed diffusion for a simple remote-surveillance sensor network and its implications for sensing, communication and computation.
Journal ArticleDOI

Wireless sensor network survey

TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.

Wireless Sensor Network -A Survey

TL;DR: In this paper, various issues are discussed that actually put the limitations in the well working and the life time of the network.

Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks

TL;DR: The proposed Geographic and Energy Aware Routing (GEAR) algorithm uses energy aware neighbor selection to route a packet towards the target region and Recursive Geographic Forwarding or Restricted flooding algorithm to disseminate the packet inside the destina-
Related Papers (5)