Publication | Closed Access
Secure Routing in Sensor Networks
29
Citations
10
References
2007
Year
Unknown Venue
Sensor NetworksEngineeringWireless SecurityInformation SecuritySecure RoutingRoutingSecurityRouting ProtocolsRobust RoutingComputer ScienceInternet Of ThingsLightweight ProtocolSensor ConnectivityFormal VerificationSecure ProtocolData SecurityCryptographyNetwork Security
In this paper, we present the secure routing in sensor networks. Routing protocols in wireless sensor networks (WSNs) are susceptible to a number of attacks depending on the nature of the protocol, its application, and the environment in which the protocol is intended to be used. Routing protocols that do not take the malicious attacks into account can not be easily tamper proofed. These protocols should be designed securely so that they are capable of asserting countermeasures whenever they need to. In this paper we evaluate the most important security attributes in wireless sensor networks. Then, based on these attributes and the application type of the routing protocols, we compare the vulnerability of different groups of protocols.
| Year | Citations | |
|---|---|---|
Page 1
Page 1