메뉴 건너뛰기




Volumn 41, Issue 1, 2014, Pages 517-530

Routing protocol design for secure WSN: Review and open research issues

Author keywords

Design; Networks; Routing; Security; Sensor; Wireless

Indexed keywords

DESIGN; NETWORKS (CIRCUITS); RADIO; RESEARCH; ROUTING PROTOCOLS; SENSORS;

EID: 84898803645     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2014.02.008     Document Type: Review
Times cited : (95)

References (109)
  • 1
    • 33751348603 scopus 로고    scopus 로고
    • Wireless sensor networks- part II: Routing protocols and security issues
    • DOI 10.1109/CCECE.2005.1556879, 1556879, Canadian Conference on Electrical and Computer Engineering 2005
    • Abd-El-Barr ML, Al-Otaibi MM, Youssef MA. Wireless Sensor networks - part II: routing protocols and security issues. In: Proceedings of the Canadian conference on electrical and computer engineering. Saskatoon, Canada; 2005. p. 69-72. (Pubitemid 44801569)
    • (2005) Canadian Conference on Electrical and Computer Engineering , vol.2005 , pp. 69-72
    • Abd-El-Barr, M.I.1    Al-Otaibi, M.M.2    Youssef, M.A.3
  • 3
    • 13944283393 scopus 로고    scopus 로고
    • Survey on routing protocols for wireless sensor networks
    • Akkaya K, Younis MA. Survey on routing protocols for wireless sensor networks. Ad Hoc Networks 3:325-49.
    • Ad Hoc Networks , vol.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.A.2
  • 5
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • M. Al Ameen, J. Liu, and K. Kwak Security and privacy issues in wireless sensor networks for healthcare applications J Med Syst 36 2010 93 101
    • (2010) J Med Syst , vol.36 , pp. 93-101
    • Al Ameen, M.1    Liu, J.2    Kwak, K.3
  • 7
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • J.N. Al-Karaki, and A.E. Kamal Routing techniques in wireless sensor networks: a survey IEEE Wireless Commun 11 2004 6 28
    • (2004) IEEE Wireless Commun , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 12
    • 84873338686 scopus 로고    scopus 로고
    • Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks
    • N.A. Alrajeh, S. Khan, J. Lloret, and J. Loo Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks Int J Distrib Sens Netw 2013 2013 11
    • (2013) Int J Distrib Sens Netw , vol.2013 , pp. 11
    • Alrajeh, N.A.1    Khan, S.2    Lloret, J.3    Loo, J.4
  • 20
    • 79956094979 scopus 로고    scopus 로고
    • Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
    • Y. Challal, A. Ouadjaout, N. Lasla, M. Bagaa, and A. Hadjidj Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks J Netw Comput Appl 34 2011 1380 1397
    • (2011) J Netw Comput Appl , vol.34 , pp. 1380-1397
    • Challal, Y.1    Ouadjaout, A.2    Lasla, N.3    Bagaa, M.4    Hadjidj, A.5
  • 22
    • 0035428428 scopus 로고    scopus 로고
    • Sensor information networking architecture and applications
    • DOI 10.1109/98.944004
    • S. Chien-Chung, C. Srisathapornphat, and C. Jaikaeo Sensor information networking architecture and applications IEEE Pers Commun 8 2001 52 59 (Pubitemid 33060768)
    • (2001) IEEE Personal Communications , vol.8 , Issue.4 , pp. 52-59
    • Shen, C.-C.1    Srisathapornphat, C.2    Jaikaeo, C.3
  • 23
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • DOI 10.1109/MCOM.2002.1039859
    • H. Deng, W. Li, and D.P. Agrawal Routing security in wireless ad hoc networks IEEE Commun Mag 40 2002 70 75 (Pubitemid 35311948)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 24
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: Intrusion-tolerant routing for wireless sensor networks
    • DOI 10.1016/j.comcom.2005.05.018, PII S0140366405002045
    • J. Deng, R. Han, and S. Mishra INSENS: intrusion-tolerant routing for wireless sensor networks Comput Commun 29 2006 216 230 (Pubitemid 43060026)
    • (2006) Computer Communications , vol.29 , Issue.2 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 27
    • 84887255066 scopus 로고    scopus 로고
    • An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks
    • A. Diop, Y. Qi, Q. Wang, and S. Hussain An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks Int J Comput Sci Issues 10 2013 490 500
    • (2013) Int J Comput Sci Issues , vol.10 , pp. 490-500
    • Diop, A.1    Qi, Y.2    Wang, Q.3    Hussain, S.4
  • 29
    • 28444461824 scopus 로고    scopus 로고
    • Secure cell relay routing protocol for sensor networks
    • 9a.6, Conference Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005
    • Du X, Lin F. Secure cell relay routing protocol for sensor networks. In: Proceedings of the 24th IEEE international conference on performance, computing, and communications conference (IPCCC 2005). Phoenix, Arizona; 2005. p. 477-82. (Pubitemid 41729988)
    • (2005) Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference , pp. 477-482
    • Du, X.1    Lin, F.2
  • 30
    • 84860890708 scopus 로고    scopus 로고
    • Survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks
    • S. Ehsan, and B.A. Hamdaoui Survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks IEEE Commun Surv Tutor 14 2011 265 278
    • (2011) IEEE Commun Surv Tutor , vol.14 , pp. 265-278
    • Ehsan, S.1    Hamdaoui, B.A.2
  • 32
    • 84878625354 scopus 로고    scopus 로고
    • New trends in secure routing protocols for wireless sensor networks
    • A.M. El-Semary, and M.M. Abdel-Azim New trends in secure routing protocols for wireless sensor networks Int J Distrib Sens Netw 2013 2013 16
    • (2013) Int J Distrib Sens Netw , vol.2013 , pp. 16
    • El-Semary, A.M.1    Abdel-Azim, M.M.2
  • 36
    • 84865209827 scopus 로고    scopus 로고
    • Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks
    • S.M. Gaurav, R.J. D'Souza, and G. Varaprasad Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks IEEE Sens J 12 2012 2941 2949
    • (2012) IEEE Sens J , vol.12 , pp. 2941-2949
    • Gaurav, S.M.1    D'Souza, R.J.2    Varaprasad, G.3
  • 40
    • 84878655787 scopus 로고    scopus 로고
    • Study on the security issues in WSN
    • T. Halim, and M.R.A. Islam Study on the security issues in WSN Int J Comput Appl 53 2012 26 32
    • (2012) Int J Comput Appl , vol.53 , pp. 26-32
    • Halim, T.1    Islam, M.R.A.2
  • 44
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • DOI 10.1007/s11276-004-4744-y
    • Y.C. Hu, A. Perrig, and D.B. Johnson Ariadne: a secure on-demand routing protocol for ad hoc networks Wirel Netw 11 2005 21 38 (Pubitemid 40536374)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 51
    • 84993803009 scopus 로고    scopus 로고
    • An efficient detection model of selective forwarding attacks in wireless mesh networks
    • Y. Xiang, M. Pathan, X. Tao, H. Wang, Springer Berlin Heidelberg
    • S. Khanam, H. Saleem, and A.S. Pathan An efficient detection model of selective forwarding attacks in wireless mesh networks Y. Xiang, M. Pathan, X. Tao, H. Wang, Internet and distributed computing systems 2012 Springer Berlin Heidelberg 1 14
    • (2012) Internet and Distributed Computing Systems , pp. 1-14
    • Khanam, S.1    Saleem, H.2    Pathan, A.S.3
  • 52
    • 84866341880 scopus 로고    scopus 로고
    • Improvement of assurance including security for wireless sensor networks using dispersed data transmission
    • E. Kohno, T. Okazaki, M. Takeuchi, T. Ohta, Y. Kakuda, and M. Aida Improvement of assurance including security for wireless sensor networks using dispersed data transmission J Comput Syst Sci 78 2012 1703 1715
    • (2012) J Comput Syst Sci , vol.78 , pp. 1703-1715
    • Kohno, E.1    Okazaki, T.2    Takeuchi, M.3    Ohta, T.4    Kakuda, Y.5    Aida, M.6
  • 55
    • 33751183522 scopus 로고    scopus 로고
    • A secure alternate path routing in sensor networks
    • S.B. Lee, and Y.H. Choi A secure alternate path routing in sensor networks Comput Commun 30 2006 153 165
    • (2006) Comput Commun , vol.30 , pp. 153-165
    • Lee, S.B.1    Choi, Y.H.2
  • 58
    • 51949089156 scopus 로고    scopus 로고
    • PEGASIS: Power efficient gathering in sensor information systems
    • Big Sky, Montana
    • Lindsey S, Raghavendra CS. PEGASIS: power efficient gathering in sensor information systems. In: Proceedings of the IEEE aerospace conference. Big Sky, Montana; 2002. p. 1125-30.
    • (2002) Proceedings of the IEEE Aerospace Conference , pp. 1125-1130
    • Lindsey, S.1    Raghavendra, C.S.2
  • 60
    • 33746375987 scopus 로고    scopus 로고
    • H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks
    • DOI 10.1109/TVT.2006.877707
    • W. Lou, and Y. Kwon H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks IEEE Trans Veh Technol 55 2006 1320 1330 (Pubitemid 44111427)
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1320-1330
    • Lou, W.1    Kwon, Y.2
  • 63
    • 64449088975 scopus 로고    scopus 로고
    • SeRWA: A secure routing protocol against wormhole attacks in sensor networks
    • Madria S, Yin J. SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 1051-63.
    • Ad Hoc Networks , pp. 1051-1063
    • Madria, S.1    Yin, J.2
  • 71
    • 34548042955 scopus 로고    scopus 로고
    • SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.014, PII S0140366407001727
    • N. Nasser, and Y. Chen SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks Comput Commun 30 2007 2401 2412 (Pubitemid 47285289)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2401-2412
    • Nasser, N.1    Chen, Y.2
  • 74
    • 24644489093 scopus 로고    scopus 로고
    • LHA-SP: Secure protocols for hierarchical wireless sensor networks
    • DOI 10.1109/INM.2005.1440767, 1440767, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
    • Oliveira LB, Wong HC, Loureiro AA. LHA-SP: secure protocols for hierarchical wireless sensor networks. In: Proceedings of the 9th IFIP/IEEE international symposium on integrated network management (IM 2005). Nice, France; 2005. p. 31-44. (Pubitemid 43804443)
    • (2005) 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005 , vol.2005 , pp. 31-44
    • Oliveira, L.B.1    Wong, H.C.2    Loureiro, A.A.3
  • 79
    • 57849119211 scopus 로고    scopus 로고
    • SERP: Secure energy-efficient routing protocol for densely deployed wireless sensor networks
    • A.S. Pathan, and C. Hong SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks Ann Telecommun 63 2008 529 541
    • (2008) Ann Telecommun , vol.63 , pp. 529-541
    • Pathan, A.S.1    Hong, C.2
  • 82
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner Security in wireless sensor networks Commun ACM 47 2004 53 57
    • (2004) Commun ACM , vol.47 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 83
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K.A. Jha Study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Trans Mob Comput 5 2006 128 143 (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 89
  • 90
    • 84879690590 scopus 로고    scopus 로고
    • Multipath routing techniques in wireless sensor networks: A survey
    • K. Sha, J. Gehlot, and R. Greve Multipath routing techniques in wireless sensor networks: a survey Wirel Pers Commun 70 2013 807 829
    • (2013) Wirel Pers Commun , vol.70 , pp. 807-829
    • Sha, K.1    Gehlot, J.2    Greve, R.3
  • 91
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • DOI 10.1109/MWC.2004.1368895
    • E. Shi, and A. Perrig Designing secure sensor networks IEEE Wirel Commun Mag 11 2004 38 43 (Pubitemid 40021188)
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 92
    • 84898781643 scopus 로고    scopus 로고
    • Review on security issues and attacks in wireless sensor networks
    • A. Singla, and R. Sachdeva Review on security issues and attacks in wireless sensor networks Int J Adv Res Comput Sci Softw Eng 3 2013 529 534
    • (2013) Int J Adv Res Comput Sci Softw Eng , vol.3 , pp. 529-534
    • Singla, A.1    Sachdeva, R.2
  • 93
    • 77955467415 scopus 로고    scopus 로고
    • Survey on secure multipath routing protocols in WSNs
    • E. Stavrou, and A.A. Pitsillides Survey on secure multipath routing protocols in WSNs Comput Netw 54 2010 2215 2238
    • (2010) Comput Netw , vol.54 , pp. 2215-2238
    • Stavrou, E.1    Pitsillides, A.A.2
  • 97
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • A. Wood, and J.A. Stankovic Denial of service in sensor networks Computer 35 2002 54 62 (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 102
    • 3042647758 scopus 로고    scopus 로고
    • Survey of secure wireless ad hoc routing
    • H. Yih-Chun, and A.A. Perrig Survey of secure wireless ad hoc routing IEEE Secur Priv 2 2004 28 39
    • (2004) IEEE Secur Priv , vol.2 , pp. 28-39
    • Yih-Chun, H.1    Perrig, A.A.2
  • 103
    • 56949088196 scopus 로고    scopus 로고
    • Survey of security issues in wireless sensor networks
    • W. Yong, A. Garhan, and R.A. Byrav Survey of security issues in wireless sensor networks IEEE Commun Surv Tutor 8 2006 2 23
    • (2006) IEEE Commun Surv Tutor , vol.8 , pp. 2-23
    • Yong, W.1    Garhan, A.2    Byrav, R.A.3
  • 107
    • 84878001206 scopus 로고    scopus 로고
    • Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks
    • J. Zhou Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks Int J Distrib Sens Netw 2013 2013 17
    • (2013) Int J Distrib Sens Netw , vol.2013 , pp. 17
    • Zhou, J.1
  • 108
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on computer and communications security. Washington D.C., USA: ACM; 2003. p. 62-72. (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 109
    • 84898832009 scopus 로고    scopus 로고
    • [last accessed 19.08.13].
    • IBM zEnterprise technical guide. Available at: http://www.redbooks.ibm. com/redbooks/pdfs/sg248049.pdf [last accessed 19.08.13].
    • IBM ZEnterprise Technical Guide


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.