Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues

F Ishmanov, Y Bin Zikria - Journal of Sensors, 2017 - Wiley Online Library
Routing is one of the most important operations in wireless sensor networks (WSNs) as it
deals with data delivery to base stations. Routing attacks can cripple it easily and degrade …

A novel trust-aware geographical routing scheme for wireless sensor networks

T Zahariadis, P Trakadas, HC Leligou… - Wireless personal …, 2013 - Springer
Wireless sensor networks are vulnerable to a wide set of security attacks, including those
targeting the routing protocol functionality. The applicability of legacy security solutions is …

Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks

H Al-Hamadi, R Chen - IEEE Transactions on Network and …, 2013 - ieeexplore.ieee.org
In this paper we propose redundancy management of heterogeneous wireless sensor
networks (HWSNs), utilizing multipath routing to answer user queries in the presence of …

Systematic design of trust management systems for wireless sensor networks: A review

K Kant - 2014 Fourth International Conference on Advanced …, 2014 - ieeexplore.ieee.org
Conventional cryptography methods alone are not adequate for secure routing in Wireless
Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to …

Fault detection and recovery scheme for routing and lifetime enhancement in WSN

M Yuvaraja, M Sabrigiriraj - Wireless Networks, 2017 - Springer
In WSNs, failures are unavoidable due to the inhospitable environment and unattended
deployment. The node failure leads to disconnection from the network and causes network …

Combining trust with location information for routing in wireless sensor networks

HC Leligou, P Trakadas, S Maniatis… - wireless …, 2012 - Wiley Online Library
As the applications of wireless sensor networks proliferate, the efficiency in supporting large
sensor networks and offering security guarantees becomes an important requirement in the …

GSR: Geographic Secured Routing using SHA-3 algorithm for node and message authentication in wireless sensor networks

BP Laxmi, A Chilambuchelvan - Future Generation Computer Systems, 2017 - Elsevier
Abstract Secured Two Phase geographic Greedy Forwarding (SecuTPGF) is a greedy
geographic forwarding protocol. It is used for transmitting multimedia data streams in …

Two‐level cooperative and energy‐efficient tracking algorithm in wireless sensor networks

G Wang, MZA Bhuiyan, L Zhang - … and Computation: Practice …, 2010 - Wiley Online Library
Conventional target tracking systems are based on powerful sensor nodes, capable of
detecting and locating a target in a large deployment area but most systems require high …

Novel energy efficient election based routing algorithm for wireless sensor network

NR Wankhade, DN Choudhari - Procedia Computer Science, 2016 - Elsevier
In WSN Sensor node closer to the sink will exhaust their limited energy more rapidly than
other sensor nodes, since they will have to forward huge data during multi hop transmission …

[PDF][PDF] Secure geographic routing in ad hoc and wireless sensor networks

M García-Otero, T Zahariadis, F Alvarez… - EURASIP Journal on …, 2010 - Springer
Security in sensor networks is one of the most relevant research topics in resource
constrained wireless devices and networks. Several attacks can be suffered in ad hoc and …