2012
DOI: 10.4172/2090-4886.1000103
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and μTesla forWireless Sensor Networks.

Abstract: Recently, wireless sensor networks (WSNs) have been deployed into a variety of applications including homeland security and military systems. Sensor nodes deployed in such networks are subject to several attacks including sinkhole, selective forwarding, wormhole, and spoofing attacks. Therefore, developing secure and energy-efficient routing protocols is imperative. This paper proposes an energy-efficient secure routing protocol for WSNs in which each sensor node forwards packets based on its own information. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The aforementioned attacks may render the network inefficient. Therefore, several secure routing protocols such as [53][54][55][56][57][58][59]72] have been proposed to defend against these attacks. However, new applications and new advance in the technology may need new security algorithms to protect networks against the current and new attacks that may be introduced.…”
Section: Dynamic Holesmentioning
confidence: 99%
See 1 more Smart Citation
“…The aforementioned attacks may render the network inefficient. Therefore, several secure routing protocols such as [53][54][55][56][57][58][59]72] have been proposed to defend against these attacks. However, new applications and new advance in the technology may need new security algorithms to protect networks against the current and new attacks that may be introduced.…”
Section: Dynamic Holesmentioning
confidence: 99%
“…These attacks include selective forwarding, sinkhole, wormhole, and Sybil described in Section 4. To protect WSNs against these routing attacks, a number of secure routing protocols have been proposed in the literature including SPINS [53], SSPIN [54], ITSRP [55], COOL [56], EESRP [57], DSSRP [58], TTSS [59], SRPMND [60], and STAPLE [61].…”
Section: Secure Routing Protocolsmentioning
confidence: 99%
“…Recently, a WSN has appeared in a range of applications, with home safety, forces systems, and fitness-minded. The antennas nodes deployed in this network are the topic of multiple WSN attacks, such as sinkholes, selective forward, spoofing, and wormholes [17,18]. With the rapid development of the Internet of Things (IoT), cloud computing, and social networking; smart cities are gaining more and more attention in modern society.…”
Section: Introductionmentioning
confidence: 99%