원문정보
초록
영어
In recent years, the security in Wireless sensor networks becomes a good topic for researchers; it is a challenge task due to inheritance limitations of sensors. Besides, security becomes extremely crucial factor when sensor networks are randomly deployed in a hostile environment. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to the base station, while considering the severe energy constraint and the limitations of computational and storage resources. However, security of these routing protocols has fallen beyond the scope so far. As sensor nodes may be easily captured and compromised, the classical cryptographic solutions become insufficient to provide optimal routing security, especially, for hierarchical WSNs, where cluster heads can be still among the compromised nodes. In this work, we focus at secure hierarchical routing protocols in wireless sensor networks and represent selected approaches which focusing at this matter. The purpose of this paper is to create a simulation of these protocols using NS2. Then, we analyze to what extend they have been applied to the clustering structure and compare them in terms of security, security issues for WSNs and their solutions are also discussed.
목차
1. Introduction
2. Hierarchical Routing Protocols
3. Security Goals in WSNs
4. Attacks on Routing Protocol
5. A Comparative Overview of Secure Hierarchical Routing Protocols for WSNs
6. Experimental Results
7. Results and Discussion
8. Conclusion and Future Works
References