International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.6, No.3, May. 2016

A Survey on Secure Routing Protocols in Wireless Sensor Networks

Full Text (PDF, 404KB), PP.9-19

Views:71   Downloads:4


Yasir Arfat, Riaz Ahmed Shaikh

Index Terms

Secure Routing;Cryptography;and Sensor networks;Geographical Routing


Wireless Sensor Networks (WSNs) are typically formed by collaboration of the large amount of partial sensor nodes, which are connected through wireless medium. In wireless sensor network, security is an essential aspect because of its usage in applications like monitoring, tracking, controlling, surveillance etc. Secure communication is extremely crucial in delivering vital information accurately and on the time through resource constraint sensor nodes. In this paper, our contribution is threefold. Firstly, we have summarized the network layer routing attacks on WSNs. Secondly, we have provided taxonomy of secure routing protocols of WSNs. Thirdly, we have provided a qualitative comparison of existing secure routing protocols. Results show that most of the existing secure routing schemes are not very efficient due to various reasons like high-energy consumption, and large communication overhead. 

Cite This Paper

Yasir Arfat, Riaz Ahmed Shaikh,"A Survey on Secure Routing Protocols in Wireless Sensor Networks", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.6, No.3, pp.9-19, 2016.DOI: 10.5815/ijwmt.2016.03.02


[1]M. Alshowkan, K. Elleithy, and H. Alhassan, "Ls-leach: A new secure and energy efficient routing protocol for wireless sensor networks," 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Oct 2013, pp. 215–220.

[2]B. Lata, V. Tejaswi, K. Shaila, M. Raghavendra, K. Venugopal, S. Iyengar, and L. Patnaik, "SGR: Secure geographical routing in wireless sensor networks," 9th International Conference on Industrial and Information Systems (ICIIS), Dec 2014, pp. 1 – 6. 

[3]H. Cheng, C. Rong, and G. Yang, "Design and analysis of a secure routing protocol algorithm for wireless sensor networks," IEEE International Conference on Advanced Information Networking and Applications (AINA), March 2011, pp. 475–480.

[4]F. Khan, "Secure communication and routing architecture in wireless sensor networks," 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), Oct 2014, pp. 647–650.

[5]M. BELKADI, R. AOUDJIT, M. DAOUI, and M. LALAM, "Energy efficient secure directed diffusion protocol for wireless sensor networks," International Journal of Information Technology and Computer Science (IJITCS), vol. 6, no. 1, p. 50, 2013.

[6]N. Durrani, N. Kafi, J. Shamsi, W. Haider, and A. Abbsi, "Secure multi-hop routing protocols in wireless sensor networks: Requirements, challenges and solutions," 2013 Eighth International Conference on Digital Information Management ( ICDIM), , Sept 2013, pp. 41–48.

[7]S. G, R. D'Souza, and G. Varaprasad, "Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks," Sensors Journal, IEEE, vol. 12, no. 10, pp. 2941–2949, Oct 2012. 

[8]D. Tang, T. Jiang, and J. Ren, "Secure and energy aware routing (sear) in wireless sensor networks," in Global Telecommunications Conference (GLOBECOM 2010), IEEE, Dec 2010, pp. 1 – 5.

[9]M. Yuvaraju and K. Rani, "Secure energy efficient load balancing multipath routing protocol with power management for wireless sensor networks," 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), July 2014, pp. 331–335.

[10]S. Ganesh and R. Amutha, "Efficient and secure routing protocol for wireless sensor networks through snr based dynamic clustering mechanisms," Journal of Communications and Networks, vol. 15, no. 4 , pp. 422–429, Aug 2013.

[11]G. Subramanian and R. Amutha, "Efficient and secure routing protocol for wireless sensor networks using mine detection an extension of triple umpiring system for WSN," 2012 8th International Conference on Computing Technology and Information Management (ICCM), vol. 1 , April 2012, pp. 141–145.

[12]D. Tang, T. Li, J. Ren, and J. Wu, "Cost-aware secure routing ( CASER ) protocol design for wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 960–973, April 2015.

[13]S. Kumar and S. Jena, "Scmrp: Secure cluster based multipath routing protocol for wireless sensor networks," 2010 Sixth International Conference on Wireless Communication and Sensor Networks (WCSN), Dec 2010, pp. 1 – 6.

[14]H. Kalita and A. Kar, "HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network," 2011 Third International Conference on Communication Systems and Networks (COMSNETS), Jan 2011, pp. 1-6.

[15]Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad, "The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures", IJWMT, vol.2, no.2, pp.33-44, 2012.