Professional Documents
Culture Documents
Evaluation of Secure Routing Protocols in Wireless Sensor Networks
Evaluation of Secure Routing Protocols in Wireless Sensor Networks
Evaluation of Secure Routing Protocols in Wireless Sensor Networks
net/publication/374848998
CITATIONS READS
0 20
1 author:
Tayyab Hussain
National University of Sciences & Technology
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Tayyab Hussain on 20 October 2023.
Abstract—Wireless Sensor Networks (WSNs) are structured, due to this secure routing in sensor
commonly collection of numerous sensor nodes that networks is very difficult and challenging part. These
collaborate and communicate through a wireless difficulties divided into two main areas:
medium. Security is a fundamental requirement in
WSNs due to their application in areas such as 1. Traditional challenges
monitoring, tracking, controlling, and surveillance. The
2. Secure routing challenges
need for secure communication is of utmost importance
to ensure the accurate and timely delivery of critical Here are some traditional difficulties:
information, considering the resource constraints of the
sensor nodes involved. This paper encapsulate the secure Energy efficiency
routing in wireless sensor network. Secondly, we
Low power sensing
describe different network layer attacks on WSN.
Thirdly, we have presented a taxonomy outlining secure Data acquisition
routing protocols for Wireless Sensor Networks (WSNs).
Then, we have conducted a qualitative evaluation, Power management electronics
comparing the various secure routing protocols that are
In this paper we will focus on secure routing
currently available. Results shows the Evaluation of
existing secure routing protocols on the bases of challenges and there evaluation on the bases of attacks
confidentiality, availability, integrity, key management including, spoofing, jamming, DOS, altered,
and cross-layer interactions, but the drawback of high- wormholes, furthermore, confidentiality, integrity and
energy consumption, and large communication overhead availability are also considered. We also evaluate
is still there. secure routing protocols on the bases of key
management and cross-layer interaction, furthermore
Keywords—secure routing, Wireless Sensor Networks, we cannot do evaluation without taking the reflection
Geographical Routing, of QOS Quality of service.
I. INTRODUCTION
Wireless sensors networks (WSN) has gained a very
quick hip in last decay. These numerous sensor
networks has lots of advantages over the recently used
wired network, due to the fact that they are potentially
low cost, low power, and multi-functional sensing
solutions to lot of current facing challenges. These
small sensing devices has lot of applications like,
sensing, computing, self-organization, communication.
As we know sensor is tiny or small device that gather
information and process data in order to act on the
conditions of its surroundings. These sensor networks
can connected to each-other through mesh network
protocols to form a communication network wirelessly
using radio frequency channels. The combination of
these homogeneous and heterogeneous nodes called
wireless sensor networks.
These sensor networks are formed by collection of
large number of small sensors nodes distributed in a
particular environment for noticing and monitoring.
Nature of wireless sensor networks is very complex Figure 1 Main Challenges of WSN
Figure 2 classification of WSN
VII. CONCLUSION
and lightweight cryptographic solutions for sensor
Evaluation of Secure routing protocols in WSN nodes.
emphasis the significance of cross-layer interaction,
key management, confidentiality, integrity and IX. REFRENCES:
availability in ensuring robust and secure data
[1] K. Akkaya and M. Younis, 2005,"A survey of routing
transmission of data. All protocols in above discussion protocols in wireless sensor networks and Ad hoc
examined in the evaluation exhibits varying on Network", Elsevier Journal, Volume 3 , Issue 3
different weakness and strengths. Due to this, selection [2] A. Paradisi, 2012 , " A pedagogical platform for
of appropriate protocol depend on the specific studying routing algorithms for Wireless Sensor
Networks", Master thesis in computer sciences -Vrije
requirements and network deployment. Evaluation university - Brussels, January
underscores that there should be a trade-off the
specific requirements when to select a secure routing [3] E. Stavrou and A. Pitsillides, 2010, "A Survey on Secure
Multipath Routing Protocols in WSNs",Computer
protocol. Again, such considerations will enable the Networks Journal, Volume 54, Issue13,.
deployment of a well-suited protocol that aligns with
the network's objectives and ensures the desired level [4] Chris Karlof㧘 David Wagner. “Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures[D]”. Proceedings
of security. of 2003 IEEE International Workshop on Sensor Network
Protocols and Applications, Anchorage, Alaska, pp. 113-127, (May
VIII. FUTURE WORK 2003).
With the continuous advancement of wireless sensor [5] GUO Zhi-yuan, HE Qi-yuan. “Study on Security of Routing
network (WSN) technology, its integration into Protocol in Wireless Sensor Networks”. Radio Engineering,
various aspects of our daily lives is on the rise. WSNs volume 36 No. 1, pp. 17—20,(2006)
have proven to be invaluable in applications such as [6] Jia Yufu, Dong Tianlin and Shi jian. “The Analysis for the
Security of Wireless Sensor Network”. Network Security
environmental monitoring, smart homes, healthcare,
Technology & Application , pp. 48-51, (2005.1)
and industrial automation. However, despite
significant efforts made towards ensuring secure data [7] M. Alshowkan, K. Elleithy, and H. Alhassan, “Ls-leach: A new
secure and energy efficient routing
transmission in WSNs, challenges and concerns protocol for wireless sensor networks,” 2013 IEEE/ACM 17th
regarding the security of these networks still persist. International Symposium on Distributed
Simulation and Real Time Applications (DS-RT), Oct 2013, pp.
Another significant challenge in the field of secure 215–220.
routing protocols in WSNs is the absence of a
standardized security evaluation framework for [8] F. Khan, “Secure communication and routing
comparing different protocols. Presently, researchers architecture in wireless sensor networks,” 2014 IEEE 3rd
Global Conference on Consumer Electronics (GCCE), Oct
rely on individual criteria for their evaluations, leading
2014, pp. 647–650.
to a lack of consistency and comparability among
studies. The computational complexity associated with [9] M. BELKADI, R. AOUDJIT, M. DAOUI, and M.
traditional symmetric and asymmetric approaches LALAM, “Energy efficient secure directed diffusion
poses a challenge for sensor nodes in terms of resource protocol for wireless sensor networks,” International Journal
of Information Technology and Computer Science (IJITCS),
constraints. Exploring the impact of elliptic curve
vol. 6, no. 1, p. 50, 2013.
cryptography on secure protocols could provide
interesting insights and potentially offer more efficient
[10] N. Durrani, N. Kafi, J. Shamsi, W. Haider, and A.
Abbsi, “Secure multi-hop routing protocols in wireless
sensor networks: Requirements, challenges and solutions,”
2013 Eighth International Conference on Digital
Information Management ( ICDIM), , Sept 2013, pp. 41–48.
[11] S. G, R. D’Souza, and G. Varaprasad, “Digital
signature-based secure node disjoint multipath routing
protocol for wireless sensor networks,” Sensors Journal,
IEEE, vol. 12, no. 10, pp. 2941–2949, Oct 2012.
[12] D. Tang, T. Li, J. Ren, and J. Wu, “Cost-aware secure
routing ( CASER ) protocol design for wireless sensor
networks,” IEEE Transactions on Parallel and Distributed
Systems, vol. 26, no. 4, pp. 960–973, April 2015.
[13] S. Kumar and S. Jena, “Scmrp: Secure cluster based
multipath routing protocol for wireless sensor networks,”
2010 Sixth International Conference on Wireless
Communication and Sensor Networks (WCSN), Dec 2010,
pp. 1 – 6.
[14] Yasir Arfat, Riaz Ahmed Shaikh. "A Survey on
Secure Routing Protocols in Wireless Sensor
Networks", International Journal of Wireless
and Microwave Technologies, 2016