A survey on secure multipath routing protocols in WSNs
Ημερομηνία
2010ISSN
1389-1286Source
Computer NetworksVolume
54Issue
13Pages
2215-2238Google Scholar check
Keyword(s):
Metadata
Εμφάνιση πλήρους εγγραφήςΕπιτομή
Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on the network's type and protocol's operation. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. However, taking into consideration that WSN applications need to support critical infrastructures (i.e., military, healthcare, environmental, etc.), security becomes an issue. And since these infrastructures are highly depended on the availability of resources, focus has especially been given to support a secure, resilient and reliable environment, with multipath routing being one of the added functionalities. The need for security in sensitive WSN application has lead researchers to design secure multipath routing protocols from the beginning or design security extensions for existing protocols. This paper surveys the current state-of-the-art of secure multipath routing protocols in WSNs, classifies the protocols in categories according to their security-related operational objectives, defines a new threat model in the routing procedure and identifies open research issues in the area. © 2010 Elsevier B.V. All rights reserved.
Collections
Cite as
Related items
Showing items related by title, author, creator and subject.
-
Article
On supporting security and privacy-preserving interaction through adaptive usable security
Belk, Marios; Fidas, Christos A.; Germanakos, Panagiotis; Samaras, George S. (2014)The purpose of this paper is to propose a preliminary framework for supporting usable security on the World Wide Web through adaptivity in user interface designs. In particular we elaborate the concept of "Adaptive Usable ...
-
Master Thesis
Security in e-Health: Information classification mapping into security technologies
Stavrou, Eliana (Πανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών / University of Cyprus, Faculty of Pure and Applied Sciences, 2006-06)This research work addresses security-related issues in the electronic and mobile healthcare environments and proposes an appropriate security framework. The proposed framework will identify the necessary security technologies ...
-
Conference Object
Secure Event Logging Using a Blockchain of Heterogeneous Computing Resources
Koumidis, K.; Kolios, P.; Ellinas, Georgios; Panayiotou, Christos G. (2019)Secure logging is essential for the integrity and accountability of cyber-physical systems (CPS). To prevent modification of log files the integrity of data must be ensured. In this work, we propose a solution for secure ...