Abstract
With the passage of time, Wireless Sensor Networks (WSNs) gain importance and have become one of the most fascinating areas of research in the past few years. Reliable and efficient data routing, that helps the data to reach its destination, remains the bottom line of research problem. Hence, various routing protocols are developed which are based on different parameters. But opportunistic routing has fascinated many researchers these days because of its broadcasting nature that makes it more efficient than the old routing methods. However, while routing in this sensor network the loss of data takes place because of its security lack. Therefore, security is also a challenging issue with the routing of WSN. This paper presents an overview of the WSN, its architecture, applications of WSN in different fields presented. An overview of the security aspect of routing in WSN is given. Finally, a comparison of different security methods of opportunistic routing is also presented.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Manshahia, M.S.: Wireless sensor network: a survey. Int. J. Sci. Eng. Res. 7(4), 710–716 (2016)
Shabbir, N., Hassan, S.R.: Routing protocols for wireless sensor networks (WSNs). Wirel. Sens. Netw. Insights Innov. 4, 22–37 (2017)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comm. ACM 38(4), 393–422 (2002)
Sarammal, K., Roseline, R.A.: A review: wireless sensor networks and its application, platforms, standards and tools. Int. J. Comput. Trends Technol. 4(8), 2905–2911 (2013)
Bhende, M., Wagh, S.J., Utpat, A.: A quick survey on wireless sensor networks. In: 2014 Fourth International Conference on Communication Systems and Network Technologies, CSNT, pp. 160–167 (2014)
Aldeer, M.M.N.: A summary survey on recent applications of wireless sensor networks. In: Proceeding—2013 IEEE Student Conference Research Development SCOReD 2013, pp. 485–490 (2015)
Zhang, S., Zhang, H.: A review of wireless sensor networks and its applications. IEEE International Conference on Automation Logistics ICAL, pp. 386–389 (2012)
Rashid, B., Rehmani, M.H.: Applications of wireless sensor networks for urban areas: a survey. J. Netw. Comput. Appl. 60, 192–219 (2016)
Yang, X., Deng, D., Liu, M.: An overview of routing protocols on Wireless Sensor Network. In: Proceedings of 2015 4th International Conference Computer Science Network Technology ICCSNT 2015, pp. 1000–1003 (2016)
Abdullah, M., Ehsan, A.: Routing protocols for wireless sensor networks: classifications and challenges. J. Electron. Commun. Eng. Res. 2, 5–15 (2014)
Chahal, S., Singh Gill, N.: Comparative study of various WSN routing protocols. Indian Journal Science Technology 9, 1–6 (2016)
Misra, S., Goswami, S.: Network routing: fundamentals, applications, and emerging technologies, 1st edn. Wiley, Hoboken (2017)
Patel, T.: Opportunistic routing in wireless sensor networks : a review. In: 2015 IEEE International Advance Computing Conference (IACC), pp. 983–987 (2015)
Jadhav, P., Satao, P.R.: A survey on opportunistic routing protocols for wireless sensor networks. Proced. Comput. Sci. 79, 603–609 (2016)
Mounika, M., Chinnaswamy, C.N.: Opportunistic routing protocols for wireless sensor networks: a survey. 7, 928–931 (2016)
Saidi, H., Grete, D., Adnane, A.: Opportunistic routing in wireless sensors networks. In: ICCWCS’17 International Conference on Computer Wireless Communication Systems, pp. 1–5 (2017)
Biswas, S., Morris, R.: Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput. Commun. Rev. 34, 69–74 (2004)
Sharma, M., Singh, Y., Kumar, N.: Opportunistic routing in wireless sensor networks: a comparative analysis. Opportun. Rout. Wirel. Sens. Netw. A Comp. Anal. 1(6), 94 (2014)
Pathan, A.S.K., Lee, H.W., Hong., C.S.: Security in wireless sensor networks: issues and challenges. ICACT2006, pp. 1043–1048 (2006)
Modares, H., Salleh, R., Moravejosharieh, A.: Overview of security issues in wireless sensor networks. In: Proceedings of CIMSim 2011 3rd International Conference on Computational Intelligence Modelling Simulation, pp. 308–311 (2011)
Grover, J., Sharma, S.: Security issues in wireless sensor network-a review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization ICRITO 2016 Trends Future Directions, pp. 397–404 (2016)
Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Security issues and attacks in wireless sensor network. World Appl. Sci. J. 30(10), 1224–1227 (2014)
Sen, J., Ukil, A.: LNCS 6018—a secure routing protocol for wireless sensor networks, pp. 277–290 (2010)
Sanzgiri, K., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols (ICNP’ 02), pp. 1–10 (2002)
Salehi, M., Boukerche, A.: Secure opportunistic routing protocols: methods, models, and classification. Wirel. Netw. 25, 559 (2017)
Kumar, N., Singh, Y.: Trust and packet load balancing based secure opportunistic routing protocol for WSN. In: 4th IEEE International Conference on Signal Processing, Computing and Control ISPCC 2k17, pp. 463–467 (2017)
Vamsi, P.R., Kant, K.: Trust and location-aware routing protocol for wireless sensor networks. IETE J. Res. 2, 634 (2016)
Lyu, C., et al.: SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Comput. Commun. 59, 37–51 (2015)
Rani, S.: An energy efficient based opportunistic routing metric for wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. Res. 7, 191–197 (2017)
Woungang, I.: Trust-based security protocol against blackhole attacks in opportunistic networks. 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 724–729 (2013)
Cao, Y., et al.: A trajectory-driven opportunistic routing protocol for VCPS. IEEE Trans. Aerosp. Electron. Syst. 9251, 1–13 (2018)
Salehi, M., Boukerche, A.: A novel packet salvaging model to improve the security of opportunistic routing protocols. Comput. Net. 122, 1–46 (2017)
Salehi, M., Boukerche, A., Darehshoorzadeh, A.: Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw. 50, 1–43 (2016)
Chhabra, A., Vashishth, V., Sharma, D.K.: A game theory based secure model against black hole attacks in opportunistic networks. In: 2017 51st Annual Conference on Information Sciences and Systems (2017)
Singh, Y., Mohindru, V.: Wireless sensor network security attack a node clone attack. Lap Lambert (2017)
Raza, M.A., Raza, B., Aftab, A.: Comparative study of security attacks on wireless sensor networks. Int. J. Multidiscip. Sci. Eng. 5, 16–22 (2014)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35, 54–62 (2002)
Pooja, M., Singh, V.: Security issues and sybil attack in wireless sensor networks. Int. J. P2P Netw. Trends Technol. 3, 7 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sharma, A., Singh, Y. (2020). On Security of Opportunistic Routing Protocol in Wireless Sensor Networks. In: Singh, P., Kar, A., Singh, Y., Kolekar, M., Tanwar, S. (eds) Proceedings of ICRIC 2019 . Lecture Notes in Electrical Engineering, vol 597. Springer, Cham. https://doi.org/10.1007/978-3-030-29407-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-29407-6_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29406-9
Online ISBN: 978-3-030-29407-6
eBook Packages: EngineeringEngineering (R0)