CFP last date
20 May 2024
Reseach Article

Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques

by Norhan Abdel-hamid, Labib M. Labib, Abdelhameed Ibrahim, Hesham A. Ali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 24
Year of Publication: 2018
Authors: Norhan Abdel-hamid, Labib M. Labib, Abdelhameed Ibrahim, Hesham A. Ali
10.5120/ijca2018917969

Norhan Abdel-hamid, Labib M. Labib, Abdelhameed Ibrahim, Hesham A. Ali . Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques. International Journal of Computer Applications. 181, 24 ( Oct 2018), 7-16. DOI=10.5120/ijca2018917969

@article{ 10.5120/ijca2018917969,
author = { Norhan Abdel-hamid, Labib M. Labib, Abdelhameed Ibrahim, Hesham A. Ali },
title = { Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 24 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 7-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number24/30031-2018917969/ },
doi = { 10.5120/ijca2018917969 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:54.826067+05:30
%A Norhan Abdel-hamid
%A Labib M. Labib
%A Abdelhameed Ibrahim
%A Hesham A. Ali
%T Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 24
%P 7-16
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSNs), considered as one of the successfully distributed applications that are currently used to acquire knowledge and collect information from the wirelessly devices seamlessly. The distinctive architecture of WSNs contributed to deploy it in an extensive range of modern industrial applications such as surveillance, monitoring, predicted, and automated control systems which can help in bridging the divide between user requirements and technologies. Moreover, WSNs face several challenges such as Topology control, Robustness, Placement, Power consuming, Scalability, Reliability, Resource Utilization, QoS, Data availability and Security. The main objective of this paper can be classified into two parts; the first one is to illustrate WSNs architecture, applications, challenges, and recent research directions. The second one is highlighting on routing and security design issues, security threats, countermeasures against network layer attacks to achieve secure routing, as the efficiency of the communication process is mainly based on determining the best path between nodes. We also highlight the advantages and performance issues of each secure routing technique. At the end of this paper the possible future research areas are concluded.

References
  1. Jennifer Yick, Biswanath Mukherjee, DipakGhosal, 2008, Wireless sensor network survey, Computer Networks 52, 2292-2330.
  2. ShabbirHasan, Md. ZairHussain, R. K. Singh, 2013, A Survey of Wireless Sensor Network," International Journal of Emerging Technology and Advanced Engineering 3, (Mar. 2013), 487-492.
  3. Daniele Puccinelli, Martin Haenggi, 2005, Applications and Challenges of Ubiquitous Sensing, IEEE Circuits and system magazine, 19-29.
  4. MohdFauziOthmana, KhairunnisaShazalib, 2012, Wireless Sensor Network Applications: A Study in Environment Monitoring System. In Procedia Engineering, International Symposium on Robotics and Intelligent Sensors 41, 1204-1210
  5. S.Prasanna, SrinivasaRao, 2012, An Overview of Wireless Sensor Networks Applications and Security. International Journal of Soft Computing and Engineering (IJSCE) , (May 2012), 538-540
  6. HimaniChawla, 2014, Some issues and challenges of Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Software Engineering 4, (July 2014), 236-239
  7. Shiva Mirshahi, AliakbarAkbari, SenerUysal, " Implementation of Structural Health Monitoring based on RFID and WSN," Proceeding of the IEEE 28th Canadian Conference on Electrical and Computer Engineering Halifax, Canada, May 2015, pages 1318-1323
  8. Siddhi Sharma FET, India Deepak Sethi FET, India P. P. Bhattacharya, 2015, Wireless Sensor Network Structural Design and Protocols: A Survey. Foundation of Computer Science FCS, New York, USA, (June 2015), 32-36.
  9. Jing Chen, Ruiying Du, Qian Wang, ShixiongYao, 2013, Secure Routing Based on Network Coding in Wireless Sensor Networks. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 58-64.
  10. Kai Lin · Chin-Feng Lai · Xingang Liu · Xin Guan, 2012, Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile NetwAppl, , 75-89.
  11. M. Brandl, KH Kellner, T. Posnicek, A. Kos, C. Mayerhofer, C. Fabian, 2009, An Efficient Source initiated On-Demand Data forwarding scheme for Wireless Sensor Networks. In proceedings of the 7th International Conference on information communications and Signal Processing (ICICS), 1-7
  12. AbrorAbduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, 2013, On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks, IEEE COMMUNICATIONS SURVEYS & TUTORIALS 15, 1223-1237
  13. KiranMaraiya, Kamal Kant, Nitin Gupta, 2011, Application based Study on Wireless Sensor Network, International Journal of Computer Applications 21, (May 2011), 9-15
  14. Xiaoyu Chu and Harish Sethu, 2015,Cooperative Topology Control with Adaptation for improved lifetime in wireless sensor networks. Ad Hoc Networks 30, (July 2015), 99-114
  15. Neha Keshri, Anurag Gupta, Bimal Kumar Mishra, 2016, Impact of reduced scale free network on wireless sensor network. Physica A: Statistical Mechanics and its Applications 463, (December 2016), 236-245.
  16. Azade Nazi1, Mayank Raj, Mario Di Francesco,PreetamGhosh, Sajal K. Das, 2014, Robust Deployment of Wireless Sensor Networks Using Gene Regulatory Networks. Pervasive and Mobile Computing 13, (August 2014), 246-257
  17. Roberto Magán-Carrión, RafaelA. Rodríguez-Gómez, JoséCamacho, Pedro García-Teodoro,2016, Optimal relay placement in multi-hop wireless networks. Ad Hoc Networks 46, (August 2016), 23-36.
  18. Hui Wang H. Eduardo Roman, Liyong Yuan, Yongfeng Huang, Rongli Wang, 2014, Connectivity, coverage and power consumption in large –scale wireless sensor network. Computer networks 75, (24 December 2014), 212-225.
  19. Jinbao Li a, XiaohangGuo, LongjiangGuo, ShoulingJi b, Meng Han, ZhipengCai, 2015, Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks. Ad Hoc Networks, 45-62
  20. S.SangeethaMariammala, J.Gayathrib,2015, Ensuring higher security for gathering and economically distributing the data in social wireless sensor networks. Procedia Computer Science 47, 408-416.
  21. Sergio F. Ochoa, Rodrigo Santos, 2015, Human-centric wireless sensor networks to improve information availability during urban search and rescue activities. Information Fusion 22, (March 2015), 71-84.
  22. Mostefa BENDJIMA, Mohamed Feham, 2015. Multi-Agent System for a Reliable Routing in WSN. Science and Information Conference London, UK, (July 2015), 1412-1419
  23. FALEH Rabeb, NASRI Nejah, KACHOURI Abdennaceur, SAMET Mounir, 2012. An Extensive Comparison of DSDV, DSR and AODV Protocols in wireless sensor network. International Conference on Education and e-Learning Innovations.
  24. Santar pal singh, s.c.sharma, 2015, A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks. Procedia Computer Science, International Conference on Advanced Computing and Applications 45, 687-695.
  25. ZahariahManap, BorhanuddinMohd Ali, CheeKyun Ng, Nor KamariahNoordin, AduwatiSali, 2013, A Review on Hierarchical Routing Protocols for Wireless Sensor Networks. Wireless Personal Communications 72, (September 2013), 1077-1104
  26. A.G.Gokula Kumar, R.Thiyagarajan, N.Sripriya, 2014, Data Centric Based Routing Protocols for Wireless Sensor Networks: A Survey, International Journal of Scientific and Research Publications 4, (December 2014), 2250-3153.
  27. Aditya H. Iche, Dhage, 2015, Location based Routing Protocols: A Survey, International Journal of Computer Applications 109, (January 2015), 28-31.
  28. Rajashree.V.Biradar, V.C.Patil, S.R.Sawant, Dr.R.R.Mudholkar, Classification and comparison of routing protocols in Wireless Sensor Networks. UbiccJournal, 4, 704-711
  29. Khushboo Gupta, VaishaliSikka, 2015, Design Issues and Challenges in Wireless Sensor Networks‏. International Journal of Computer Applications 112, (February 2015), 26-32
  30. P.Samundiswary and P.Dananjayan, 2010, Performance Analysis of Trust Based AODV for Wireless Sensor Networks. International Journal of Computer Applications 4, (August 2010), 6-13.
  31. Parul Kansa, DeepaliKansal, ArunBalodi, 2010, Comparison of Various Routing Protocol in Wireless Sensor Network. International Journal of Computer Applications 5, (August 2010), 14-19.
  32. I.F.Akyildiz, S.W.Sankarasubramaniam, E.Cayirci, 2002, A survey on sensor networks. IEEE Journal of Communication 40, 102-114.
  33. Rajendra Prasad Mahapatra, Rakesh Kumar Yadav, 2015, Descendant of LEACH Based Routing Protocols in Wireless Sensor Networks. Procedia Computer Science 57, 2015, 1005-1014
  34. G. Bianchi, 2010, A comparative study of the various security approaches used in wireless sensor networks. International Journal of advanced science and technology 17, (April 2010) , 31-44.
  35. Idrees S. Kocher, Chee-Onn Chow, Hiroshi Ishii, Tanveer A. Zia, Threat Models and Security Issues in Wireless Sensor Networks, International Journal of Computer Theory and Engineering 5, (October 2013), 830-835
  36. MahsaTeymourzadeh, RoshanakVahed, SoulmazAlibeygi, NargesDastanpor, 2013, Security in Wireless Sensor Networks: Issues and Challenges. International Journal of Computer Networks and Communications Security 1, (December 2013) , 329-334
  37. MahfuzulhoqChowdhury, MdFazlulKadera, Asaduzzaman, 2013, Security Issues in Wireless Sensor Networks: A Survey. International Journal of Future Generation Communication and Networking 6, 97-116.
  38. Harsh Kumar Verma, Saurabh Singh, 2011, Security for Wireless Sensor Network. International Journal of Computer Science and Engineering (IJCSE), (June 2011), 2393-2399.
  39. S.Mohammadi, R.A.Ebrahimi and H.Jadidoleslamy, 2011, A Comparison of Routing Attacks on Wireless Sensor Networks. International Journal of Information Assurance and Security (JIAS) 6, 195-215.
  40. MANJU V C, 2014, Sybil attack Preventation in Wireless Sensor Network. International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) 4, (Apr 2014), 125-132.
  41. PanagiotisSarigiannidis, EiriniKarapistoli, Anastasios A. Economides, 2015, Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 7560-7572
  42. Gayatri Devi1, RajeebSankar Bal2, Nibedita Sahoo3, 2015, Hello Flood Attack Using BAP in Wireless Sensor Network. International Journal of Advanced Engineering Research and Science (IJAERS) 2, (January 2015), 80-86.
  43. YayaShen, SanyangLiu,Zhaohui Zhang, 2015, Detection of Hello Flood Attack Caused by Malicious Cluster Heads on LEACH Protocol. International Journal of Advancements in Computing Technology (IJACT) 7, (March 2015), 40-47
  44. Rawan S. Hassoubah, Suhare M. Solaiman, Manal A. Abdullah, 2015, Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme. International Journal of Computer and Communication Engineering 4, (May 2015), 156- 165
  45. DilpreetKaur, Rupinderpal Singh, 2015, "Energy level based Hello Flood Attack Mitigation on WSN," International Journal of Embedded Systems and Computer Engineering, (July 2015), 1551-1554.
  46. Anfeng Liu, Mianxiong Dong, Kaoru Ota and Jun Long, 2015, PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs. Sensors, 30942-30963.
  47. Geethu P C, Rameez Mohammed A, 2013, Defense Mechanism against Selective Forwarding Attack in Wireless Sensor Networks. IEEE – 31661, 4th ICCCNT, (July 2013), 1-4.
  48. Ji Won Kim, Soo Young Moon, Tae Ho Cho, JinMyoung Kim, Seung Min Park, 2011, Improved message communication scheme in selective forwarding attack detection method. Digital Content, Multimedia Technology and its Applications (IDCTA), 7th International Conference, 2011
  49. AnandMotwani, VimalDhote, 2016, Optimized AODV Routing for Effective Attack Security in Wireless Sensor Networks. International Journal of Electrical, Electronics, and Computer Engineering, 33-40.
  50. Vandana B. Salve, Leena Ragha,NileshMarathe, 2015, AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks. IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 1-7.
  51. Snehal P. Dongare, Prof. R. S. Mangrulkar, 2016, Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks. International Conference on Information Security &Privacy, 11-12 December 2015, Nagpur, INDIA, Procedia Computer Science, 423-430.
  52. SinaHamedheidari, Reza Rafeh, 2013, A Novel Agent-Based Approach to Detect Sinkhole Attacks in Wireless Sensor Networks. Computers & Security, 1-14.
  53. ParmarAmisha, V.B.Vaghela, 2016, Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol. Procedia Computer Science Published by Elsevier, 7th International Conference on Communication, Computing and Virtualization, 700-707.
  54. Mariano García-Otero, AdriánPoblación-Hernández, 2012, Detection of Wormhole Attacks in Wireless Sensor Networks Using Range-Free Localization. IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 21-25
  55. JunaidAhsenaliChaudhry, Usman Tariq, Mohammed Arif Amin, Robert G. Rittenhouse,2013, Dealing with Sinkhole Attacks in Wireless Sensor Networks," Advanced Science and Technology Letters 29, 7-12.
  56. Guodong Sun, LinZhao, ZhiboChen, GuofuQiao, 2015, Effective link interference model in topology control of wireless Ad hoc and sensor networks. Journal of Network and Computer Applications 52, 69-78
  57. Xiaoyu Chu, Harish Sethu, 2015, Cooperative Topology Control with Adaptation for improved lifetime in wireless sensor networks. Ad Hoc Networks 30, 99-114
  58. Ahmed E.A.A. Abdulla, Hiroki Nishiyama, Nirwan Ansari, Nei Kato, 2011, HYMN to Improve the Scalability of Wireless Sensor Networks. The Third International Workshop on Wireless Sensor, Actuator and Robot Networks, 519-524.
  59. Azade Nazi, Mayank Raj, Mario Di Francesco, PreetamGhosh, and Sajal K. Das, 2016, Efficient communications in Wireless Sensor Networks Based on Biological Robustness. International Conference on Distributed Computing in Sensor Systems, 2016, 161- 168.
  60. Fengchao Chen, Ronglin Li, 2013, Sink Node Placement Strategies for Wireless Sensor Networks. Wireless PersCommun, 303-319.
  61. SenerKimence, IlkerBekmezci, 2013, Weighted relay node placement for wireless sensor network connectivity. Wireless Netw, 624-627.
  62. Masanari Iwata, Suhua Tang, SadaoObana, 2017, Sink-Based Centralized Transmission Scheduling by using Asymmetric Communication and Wake-up Radio.  Wireless Communications and Networking Conference (WCNC), IEEE.
  63. Soumitra Das, Dr. Barani S, Dr. SanjeevWagh, Dr.S.S.Sonavane, 2016, Energy Efficient and Trustable Routing Protocol for wireless sensor networks based on genetic algorithm (E2TRP). International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 154-159.
  64. Wenliang Wu, NaixueXiong, Chunxue Wu, 2017, Improved clustering algorithm based on energy consumption in wireless sensor networks. IET Networks, The Institution of Engineering and Technology, 1-7.
  65. Noor Zaman, Low Tang Jung, Muhammad MehboobYasin, 2016, Enhancing Energy Efficiency of Wireless Sensor Network through the Design of Energy Efficient Routing Protocol. Journal of Sensors, 1-16.
  66. Rujkumar, 2012, A Survey on Security Attacks in Wireless Sensor Network. “International Journal of Engineering Research and Applications (IJERA) 2, (July-August 2012), 1684-1691.
  67. Feiyi Wang, Brian Vetter, Shyhtsun Felix Wu, 1997, Secure Routing Protocols: Theory and Practice. U.S. Department of Defense Advanced Research Projects Agency and the U.S. Air Force Rome Laboratory, 1-14.
Index Terms

Computer Science
Information Sciences

Keywords

WSNs automated control systems routing security attacks.