2006
DOI: 10.1002/wcm.402
|View full text |Cite
|
Sign up to set email alerts
|

Secure cell relay routing protocol for sensor networks

Abstract: Past researches on sensor network routing have been focused on efficiency and effectiveness of data dissemination. Few of them consider security issues during the design time of routing protocols. Security is very important for many sensor network applications. Studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. In this paper, we propose an efficient key management scheme and a novel secure routing protocol—Secure cell … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…Secure cell relay (SCR): SCR [96] routing protocol is designed to provide resistance against security attacks. SCR is a cluster-based algorithm where nodes form a cluster (cell) based on their locations.…”
Section: Network Layermentioning
confidence: 99%
“…Secure cell relay (SCR): SCR [96] routing protocol is designed to provide resistance against security attacks. SCR is a cluster-based algorithm where nodes form a cluster (cell) based on their locations.…”
Section: Network Layermentioning
confidence: 99%
“…Following the requirement of secure routing, some integrated algorithms have been proposed. In [16], the authors proposed the Secure Cell Relay (SCR) routing protocol. SCR is an energy-efficient routing protocol with acceptable security overhead.…”
Section: Related Workmentioning
confidence: 99%
“…The manipulated sensor data attacks are divided into two classes that include manipulating user data directly and influencing the underlying routing topology. SRTLD defends against the attacks that influence the underlying routing protocol such as selective forwarding, sinkhole, Sybil, wormholes, and HELLO flood attacks [5,6].…”
Section: A Attacks On Wsns Routingmentioning
confidence: 99%
“…In particular, it is easy to eavesdrop or cause a network layer attacks which fall into one of the following categories: manipulating routing information, selective forwarding, Sybil, sinkhole, wormhole, and Hello flooding (unidirectional) attacks. Furthermore, most real-time communication and coordination routing protocols do not address security, so it is easy for an adversary to exploit those routing protocols on a given WSNs [5,6]. Lightweight security schemes are required in real-time routing protocols for WSN.…”
Section: Introductionmentioning
confidence: 99%