Analysis of Typical Secure Routing Protocols in WSN

被引:0
|
作者
He, Jingsha [1 ,2 ]
Zhou, Bo [1 ]
Liu, Ruohong [2 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
[2] Beijing Dev Area Co Ltd, Beijing 100176, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Wireless Sensor Network (WSN); network security; secure scheme; secure routing protocol;
D O I
10.14257/ijsia.2014.8.6.04
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper will first sum up the typical attacks and countermeasures in the network layer of Wireless Sensor Network (WSN), then it will classify the existing secure routing protocols according to the core secure schemes used by them, and emphatically introduce and analyze the typical ones among them. Finally this paper will propose some problems on secure routing, which requires further studying.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [1] A Novel Approach to Secure Routing Protocols in WSN
    Patil, Bharati
    Kadam, Rutuja
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1094 - 1097
  • [2] ANALYSIS AND COMPARISON OF WSN ROUTING PROTOCOLS ORIENTED TO WBAN
    Wang, Yidan
    Liu, Yi
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 952 - 955
  • [3] Analysis of Multicast Routing Protocols for Secure Manet
    Maragatharajan, M.
    Balakannan, S. P.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [4] Comparative analysis of energy efficient routing protocols with optimization in WSN
    Sreedevi, Pogula
    Venkateswarlu, S.
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE DESIGN AND MANUFACTURING - IJIDEM, 2022,
  • [5] A Comparative Study of Routing Protocols in WSN
    Aznaoui, Hanane
    Raghay, Said
    Aziz, Layla
    Ait-Mlouk, Addi
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2015,
  • [6] Improving Routing Protocols of WSN in WHSN
    Tan, Ruochen
    Xu, Yang
    Chen, Zheng
    Zha, Min
    Tsou, Tina
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 56 - 60
  • [7] A Secure Anonymous Routing Protocol in WSN
    Yang, Guang
    Geng, Guining
    Song, Jing
    Liu, Zhaohui
    Han, He
    Gao, Xiangang
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2013, : 415 - 418
  • [8] How Secure are Secure Interdomain Routing Protocols?
    Goldberg, Sharon
    Schapira, Michael
    Hummon, Peter
    Rexford, Jennifer
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 87 - 98
  • [9] How secure are secure interdomain routing protocols?
    Goldberg, Sharon
    Schapira, Michael
    Hummon, Pete
    Rexford, Jennifer
    [J]. COMPUTER NETWORKS, 2014, 70 : 260 - 287
  • [10] Performance Analysis of WSN Routing Protocols with Effective Buffer Management Technique
    Padmashree, T.
    Cauvery, N. K.
    Chavan, Soniya
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 86 - 93