On Security of Opportunistic Routing Protocol in Wireless Sensor Networks

  • Archana SharmaEmail author
  • Yashwant Singh
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 597)


With the passage of time, Wireless Sensor Networks (WSNs) gain importance and have become one of the most fascinating areas of research in the past few years. Reliable and efficient data routing, that helps the data to reach its destination, remains the bottom line of research problem. Hence, various routing protocols are developed which are based on different parameters. But opportunistic routing has fascinated many researchers these days because of its broadcasting nature that makes it more efficient than the old routing methods. However, while routing in this sensor network the loss of data takes place because of its security lack. Therefore, security is also a challenging issue with the routing of WSN. This paper presents an overview of the WSN, its architecture, applications of WSN in different fields presented. An overview of the security aspect of routing in WSN is given. Finally, a comparison of different security methods of opportunistic routing is also presented.


Wireless sensor networks Routing protocol Opportunistic routing Security 


  1. 1.
    Manshahia, M.S.: Wireless sensor network: a survey. Int. J. Sci. Eng. Res. 7(4), 710–716 (2016)Google Scholar
  2. 2.
    Shabbir, N., Hassan, S.R.: Routing protocols for wireless sensor networks (WSNs). Wirel. Sens. Netw. Insights Innov. 4, 22–37 (2017)Google Scholar
  3. 3.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comm. ACM 38(4), 393–422 (2002)Google Scholar
  4. 4.
    Sarammal, K., Roseline, R.A.: A review: wireless sensor networks and its application, platforms, standards and tools. Int. J. Comput. Trends Technol. 4(8), 2905–2911 (2013)Google Scholar
  5. 5.
    Bhende, M., Wagh, S.J., Utpat, A.: A quick survey on wireless sensor networks. In: 2014 Fourth International Conference on Communication Systems and Network Technologies, CSNT, pp. 160–167 (2014)Google Scholar
  6. 6.
    Aldeer, M.M.N.: A summary survey on recent applications of wireless sensor networks. In: Proceeding—2013 IEEE Student Conference Research Development SCOReD 2013, pp. 485–490 (2015)Google Scholar
  7. 7.
    Zhang, S., Zhang, H.: A review of wireless sensor networks and its applications. IEEE International Conference on Automation Logistics ICAL, pp. 386–389 (2012)Google Scholar
  8. 8.
    Rashid, B., Rehmani, M.H.: Applications of wireless sensor networks for urban areas: a survey. J. Netw. Comput. Appl. 60, 192–219 (2016)CrossRefGoogle Scholar
  9. 9.
    Yang, X., Deng, D., Liu, M.: An overview of routing protocols on Wireless Sensor Network. In: Proceedings of 2015 4th International Conference Computer Science Network Technology ICCSNT 2015, pp. 1000–1003 (2016)Google Scholar
  10. 10.
    Abdullah, M., Ehsan, A.: Routing protocols for wireless sensor networks: classifications and challenges. J. Electron. Commun. Eng. Res. 2, 5–15 (2014)Google Scholar
  11. 11.
    Chahal, S., Singh Gill, N.: Comparative study of various WSN routing protocols. Indian Journal Science Technology 9, 1–6 (2016)CrossRefGoogle Scholar
  12. 12.
    Misra, S., Goswami, S.: Network routing: fundamentals, applications, and emerging technologies, 1st edn. Wiley, Hoboken (2017)CrossRefGoogle Scholar
  13. 13.
    Patel, T.: Opportunistic routing in wireless sensor networks : a review. In: 2015 IEEE International Advance Computing Conference (IACC), pp. 983–987 (2015)Google Scholar
  14. 14.
    Jadhav, P., Satao, P.R.: A survey on opportunistic routing protocols for wireless sensor networks. Proced. Comput. Sci. 79, 603–609 (2016)CrossRefGoogle Scholar
  15. 15.
    Mounika, M., Chinnaswamy, C.N.: Opportunistic routing protocols for wireless sensor networks: a survey. 7, 928–931 (2016)Google Scholar
  16. 16.
    Saidi, H., Grete, D., Adnane, A.: Opportunistic routing in wireless sensors networks. In: ICCWCS’17 International Conference on Computer Wireless Communication Systems, pp. 1–5 (2017)Google Scholar
  17. 17.
    Biswas, S., Morris, R.: Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput. Commun. Rev. 34, 69–74 (2004)CrossRefGoogle Scholar
  18. 18.
    Sharma, M., Singh, Y., Kumar, N.: Opportunistic routing in wireless sensor networks: a comparative analysis. Opportun. Rout. Wirel. Sens. Netw. A Comp. Anal. 1(6), 94 (2014)Google Scholar
  19. 19.
    Pathan, A.S.K., Lee, H.W., Hong., C.S.: Security in wireless sensor networks: issues and challenges. ICACT2006, pp. 1043–1048 (2006)Google Scholar
  20. 20.
    Modares, H., Salleh, R., Moravejosharieh, A.: Overview of security issues in wireless sensor networks. In: Proceedings of CIMSim 2011 3rd International Conference on Computational Intelligence Modelling Simulation, pp. 308–311 (2011)Google Scholar
  21. 21.
    Grover, J., Sharma, S.: Security issues in wireless sensor network-a review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization ICRITO 2016 Trends Future Directions, pp. 397–404 (2016)Google Scholar
  22. 22.
    Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Security issues and attacks in wireless sensor network. World Appl. Sci. J. 30(10), 1224–1227 (2014)Google Scholar
  23. 23.
    Sen, J., Ukil, A.: LNCS 6018—a secure routing protocol for wireless sensor networks, pp. 277–290 (2010)Google Scholar
  24. 24.
    Sanzgiri, K., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols (ICNP’ 02), pp. 1–10 (2002)Google Scholar
  25. 25.
    Salehi, M., Boukerche, A.: Secure opportunistic routing protocols: methods, models, and classification. Wirel. Netw. 25, 559 (2017)CrossRefGoogle Scholar
  26. 26.
    Kumar, N., Singh, Y.: Trust and packet load balancing based secure opportunistic routing protocol for WSN. In: 4th IEEE International Conference on Signal Processing, Computing and Control ISPCC 2k17, pp. 463–467 (2017)Google Scholar
  27. 27.
    Vamsi, P.R., Kant, K.: Trust and location-aware routing protocol for wireless sensor networks. IETE J. Res. 2, 634 (2016)CrossRefGoogle Scholar
  28. 28.
    Lyu, C., et al.: SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Comput. Commun. 59, 37–51 (2015)CrossRefGoogle Scholar
  29. 29.
    Rani, S.: An energy efficient based opportunistic routing metric for wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. Res. 7, 191–197 (2017)CrossRefGoogle Scholar
  30. 30.
    Woungang, I.: Trust-based security protocol against blackhole attacks in opportunistic networks. 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 724–729 (2013)Google Scholar
  31. 31.
    Cao, Y., et al.: A trajectory-driven opportunistic routing protocol for VCPS. IEEE Trans. Aerosp. Electron. Syst. 9251, 1–13 (2018)Google Scholar
  32. 32.
    Salehi, M., Boukerche, A.: A novel packet salvaging model to improve the security of opportunistic routing protocols. Comput. Net. 122, 1–46 (2017)CrossRefGoogle Scholar
  33. 33.
    Salehi, M., Boukerche, A., Darehshoorzadeh, A.: Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw. 50, 1–43 (2016)CrossRefGoogle Scholar
  34. 34.
    Chhabra, A., Vashishth, V., Sharma, D.K.: A game theory based secure model against black hole attacks in opportunistic networks. In: 2017 51st Annual Conference on Information Sciences and Systems (2017)Google Scholar
  35. 35.
    Singh, Y., Mohindru, V.: Wireless sensor network security attack a node clone attack. Lap Lambert (2017)Google Scholar
  36. 36.
    Raza, M.A., Raza, B., Aftab, A.: Comparative study of security attacks on wireless sensor networks. Int. J. Multidiscip. Sci. Eng. 5, 16–22 (2014)Google Scholar
  37. 37.
    Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35, 54–62 (2002)CrossRefGoogle Scholar
  38. 38.
    Pooja, M., Singh, V.: Security issues and sybil attack in wireless sensor networks. Int. J. P2P Netw. Trends Technol. 3, 7 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and Information TechnologyCentral University of JammuSambaIndia

Personalised recommendations