Skip to main content

On Security of Opportunistic Routing Protocol in Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 597))

Abstract

With the passage of time, Wireless Sensor Networks (WSNs) gain importance and have become one of the most fascinating areas of research in the past few years. Reliable and efficient data routing, that helps the data to reach its destination, remains the bottom line of research problem. Hence, various routing protocols are developed which are based on different parameters. But opportunistic routing has fascinated many researchers these days because of its broadcasting nature that makes it more efficient than the old routing methods. However, while routing in this sensor network the loss of data takes place because of its security lack. Therefore, security is also a challenging issue with the routing of WSN. This paper presents an overview of the WSN, its architecture, applications of WSN in different fields presented. An overview of the security aspect of routing in WSN is given. Finally, a comparison of different security methods of opportunistic routing is also presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Manshahia, M.S.: Wireless sensor network: a survey. Int. J. Sci. Eng. Res. 7(4), 710–716 (2016)

    Google Scholar 

  2. Shabbir, N., Hassan, S.R.: Routing protocols for wireless sensor networks (WSNs). Wirel. Sens. Netw. Insights Innov. 4, 22–37 (2017)

    Google Scholar 

  3. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comm. ACM 38(4), 393–422 (2002)

    Google Scholar 

  4. Sarammal, K., Roseline, R.A.: A review: wireless sensor networks and its application, platforms, standards and tools. Int. J. Comput. Trends Technol. 4(8), 2905–2911 (2013)

    Google Scholar 

  5. Bhende, M., Wagh, S.J., Utpat, A.: A quick survey on wireless sensor networks. In: 2014 Fourth International Conference on Communication Systems and Network Technologies, CSNT, pp. 160–167 (2014)

    Google Scholar 

  6. Aldeer, M.M.N.: A summary survey on recent applications of wireless sensor networks. In: Proceeding—2013 IEEE Student Conference Research Development SCOReD 2013, pp. 485–490 (2015)

    Google Scholar 

  7. Zhang, S., Zhang, H.: A review of wireless sensor networks and its applications. IEEE International Conference on Automation Logistics ICAL, pp. 386–389 (2012)

    Google Scholar 

  8. Rashid, B., Rehmani, M.H.: Applications of wireless sensor networks for urban areas: a survey. J. Netw. Comput. Appl. 60, 192–219 (2016)

    Article  Google Scholar 

  9. Yang, X., Deng, D., Liu, M.: An overview of routing protocols on Wireless Sensor Network. In: Proceedings of 2015 4th International Conference Computer Science Network Technology ICCSNT 2015, pp. 1000–1003 (2016)

    Google Scholar 

  10. Abdullah, M., Ehsan, A.: Routing protocols for wireless sensor networks: classifications and challenges. J. Electron. Commun. Eng. Res. 2, 5–15 (2014)

    Google Scholar 

  11. Chahal, S., Singh Gill, N.: Comparative study of various WSN routing protocols. Indian Journal Science Technology 9, 1–6 (2016)

    Article  Google Scholar 

  12. Misra, S., Goswami, S.: Network routing: fundamentals, applications, and emerging technologies, 1st edn. Wiley, Hoboken (2017)

    Book  Google Scholar 

  13. Patel, T.: Opportunistic routing in wireless sensor networks : a review. In: 2015 IEEE International Advance Computing Conference (IACC), pp. 983–987 (2015)

    Google Scholar 

  14. Jadhav, P., Satao, P.R.: A survey on opportunistic routing protocols for wireless sensor networks. Proced. Comput. Sci. 79, 603–609 (2016)

    Article  Google Scholar 

  15. Mounika, M., Chinnaswamy, C.N.: Opportunistic routing protocols for wireless sensor networks: a survey. 7, 928–931 (2016)

    Google Scholar 

  16. Saidi, H., Grete, D., Adnane, A.: Opportunistic routing in wireless sensors networks. In: ICCWCS’17 International Conference on Computer Wireless Communication Systems, pp. 1–5 (2017)

    Google Scholar 

  17. Biswas, S., Morris, R.: Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput. Commun. Rev. 34, 69–74 (2004)

    Article  Google Scholar 

  18. Sharma, M., Singh, Y., Kumar, N.: Opportunistic routing in wireless sensor networks: a comparative analysis. Opportun. Rout. Wirel. Sens. Netw. A Comp. Anal. 1(6), 94 (2014)

    Google Scholar 

  19. Pathan, A.S.K., Lee, H.W., Hong., C.S.: Security in wireless sensor networks: issues and challenges. ICACT2006, pp. 1043–1048 (2006)

    Google Scholar 

  20. Modares, H., Salleh, R., Moravejosharieh, A.: Overview of security issues in wireless sensor networks. In: Proceedings of CIMSim 2011 3rd International Conference on Computational Intelligence Modelling Simulation, pp. 308–311 (2011)

    Google Scholar 

  21. Grover, J., Sharma, S.: Security issues in wireless sensor network-a review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization ICRITO 2016 Trends Future Directions, pp. 397–404 (2016)

    Google Scholar 

  22. Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Security issues and attacks in wireless sensor network. World Appl. Sci. J. 30(10), 1224–1227 (2014)

    Google Scholar 

  23. Sen, J., Ukil, A.: LNCS 6018—a secure routing protocol for wireless sensor networks, pp. 277–290 (2010)

    Google Scholar 

  24. Sanzgiri, K., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols (ICNP’ 02), pp. 1–10 (2002)

    Google Scholar 

  25. Salehi, M., Boukerche, A.: Secure opportunistic routing protocols: methods, models, and classification. Wirel. Netw. 25, 559 (2017)

    Article  Google Scholar 

  26. Kumar, N., Singh, Y.: Trust and packet load balancing based secure opportunistic routing protocol for WSN. In: 4th IEEE International Conference on Signal Processing, Computing and Control ISPCC 2k17, pp. 463–467 (2017)

    Google Scholar 

  27. Vamsi, P.R., Kant, K.: Trust and location-aware routing protocol for wireless sensor networks. IETE J. Res. 2, 634 (2016)

    Article  Google Scholar 

  28. Lyu, C., et al.: SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Comput. Commun. 59, 37–51 (2015)

    Article  Google Scholar 

  29. Rani, S.: An energy efficient based opportunistic routing metric for wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. Res. 7, 191–197 (2017)

    Article  Google Scholar 

  30. Woungang, I.: Trust-based security protocol against blackhole attacks in opportunistic networks. 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 724–729 (2013)

    Google Scholar 

  31. Cao, Y., et al.: A trajectory-driven opportunistic routing protocol for VCPS. IEEE Trans. Aerosp. Electron. Syst. 9251, 1–13 (2018)

    Google Scholar 

  32. Salehi, M., Boukerche, A.: A novel packet salvaging model to improve the security of opportunistic routing protocols. Comput. Net. 122, 1–46 (2017)

    Article  Google Scholar 

  33. Salehi, M., Boukerche, A., Darehshoorzadeh, A.: Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw. 50, 1–43 (2016)

    Article  Google Scholar 

  34. Chhabra, A., Vashishth, V., Sharma, D.K.: A game theory based secure model against black hole attacks in opportunistic networks. In: 2017 51st Annual Conference on Information Sciences and Systems (2017)

    Google Scholar 

  35. Singh, Y., Mohindru, V.: Wireless sensor network security attack a node clone attack. Lap Lambert (2017)

    Google Scholar 

  36. Raza, M.A., Raza, B., Aftab, A.: Comparative study of security attacks on wireless sensor networks. Int. J. Multidiscip. Sci. Eng. 5, 16–22 (2014)

    Google Scholar 

  37. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35, 54–62 (2002)

    Article  Google Scholar 

  38. Pooja, M., Singh, V.: Security issues and sybil attack in wireless sensor networks. Int. J. P2P Netw. Trends Technol. 3, 7 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Archana Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, A., Singh, Y. (2020). On Security of Opportunistic Routing Protocol in Wireless Sensor Networks. In: Singh, P., Kar, A., Singh, Y., Kolekar, M., Tanwar, S. (eds) Proceedings of ICRIC 2019 . Lecture Notes in Electrical Engineering, vol 597. Springer, Cham. https://doi.org/10.1007/978-3-030-29407-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29407-6_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29406-9

  • Online ISBN: 978-3-030-29407-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics