2015
DOI: 10.1016/j.jnca.2015.04.018
|View full text |Cite
|
Sign up to set email alerts
|

Survey of secure multipath routing protocols for WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(12 citation statements)
references
References 84 publications
0
12
0
Order By: Relevance
“…Multipath routing can improve the reliability of data transmission and balance the load for the network. In [10,21], multiple paths were established by utilizing the redundancy of wireless sensor nodes to ensure the reliability of data transmission. The authors of [22] presented a multipath routing protocol to ensure network security by building node disjoint paths.…”
Section: Intrusion Detection Intrusion Detection Is Used To Detect Amentioning
confidence: 99%
See 1 more Smart Citation
“…Multipath routing can improve the reliability of data transmission and balance the load for the network. In [10,21], multiple paths were established by utilizing the redundancy of wireless sensor nodes to ensure the reliability of data transmission. The authors of [22] presented a multipath routing protocol to ensure network security by building node disjoint paths.…”
Section: Intrusion Detection Intrusion Detection Is Used To Detect Amentioning
confidence: 99%
“…The existing routing protocols for WSNs cannot effectively balance security and energy consumption [8][9][10]. Most of these protocols rely on encryption and trust mechanisms to guarantee security.…”
Section: Introductionmentioning
confidence: 99%
“…But the compact design of sensor nodes with little security attributes increases security challenges and vulnerabilities. Further, due to resources contraints, security features is considered last in the design of WSN [9], [10]. Given the resource limitation and salient feature of WSN, the addition of security is the last thing considered in the design of WSN for the reason that it produces unwanted surplus to energy cost and processing overload cost to sensor nodes [11].…”
Section: Introductionmentioning
confidence: 99%
“…Methods for tolerating various kind of faults within networks are an important and ongoing area of research [3, 7, 8]. Adversarial faults , those in which an adversary can target attacks strategically, deserve special attention.…”
Section: Introductionmentioning
confidence: 99%
“…We next present a structured multipath fault tolerance (SMFT) scheme to extend standard fault tolerance techniques to the case of adversarial faults in networks [16, 17]. The SMFT scheme requires the existence of a concurrent multipath routing (CMR) algorithm [7, 18, 19], to takes advantage of the independence of faults along independent paths . We also present a novel CMR algorithm for the butterfly network topology.…”
Section: Introductionmentioning
confidence: 99%