2015
DOI: 10.3390/s150715127
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

Abstract: The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…A sensor node elects a cluster head after collecting all advertising information. After the cluster head is chosen, the secret common key index is shared 16 . Due to the changing topology of portable networks, the most problematic aspect is routing methods.…”
Section: Related Workmentioning
confidence: 99%
“…A sensor node elects a cluster head after collecting all advertising information. After the cluster head is chosen, the secret common key index is shared 16 . Due to the changing topology of portable networks, the most problematic aspect is routing methods.…”
Section: Related Workmentioning
confidence: 99%
“…Generally, most of the routing protocols' primary focus is to attain power conservation in WSNs [15]- [18]. With regards, some of them focused on the energy-efficient routing protocol [19]- [21], energy-efficient cluster-based routing protocol [22]- [25], trust with key management based routing system for achieving high security [26], [27], and optimization based routing technique with security [28]- [31]. The summary of these methods is discussed as follows.…”
Section: Related Workmentioning
confidence: 99%
“…From this approach can protect information exchange, secure data delivery as well as update the rout by isolation of malicious nodes. Rahayu et al [20], introduced a combinational approach of secure routing protocol and secure data aggregation protocol i.e., the study proposed a LEACH-based secure routing protocol (SLEACH) so as to optimize the security level of any data-aggregation protocol. The principal motive of the proposed study is to show the significance of considering SLEACH and secure data-aggregation together in designing a routing protocol for any WSNs to attain energy aware secure routing protocol.…”
Section: Related Workmentioning
confidence: 99%