In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas. One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments. While in last few years the routing approaches were mainly focussing on metrics such as robustness, energy preservation, etc., recently, different security solutions came to the fore that were taking also the security issues in WSNs into account. In this paper, different types of attacks on the routing layer of WSNs are investigated. Subsequently, measures for secure routing; including cryptography, key establishment, trust & reputation and secure localization; are reviewed, which were proposed by researchers in this area. Based on these findings, future prospects are discussed and final conclusions will be drawn.Keywords wireless sensor networks; secure routing; WSNs
IntroductionSince years, the monitoring of areas of interest is a topic of great importance for civil as well as military applications, such as emergency scenarios, manufacturing environments, battle fields etc. Due to the advances in micro-electronics, highly integrated electronics and improved energy accumulators, in the last few years, the development of sensor nodes was intensified so that the sensor nodes got smaller and smaller, while the price per sensor went down at the same time. One of the major ideas was that the sensor nodes should form a collaborative wireless network to monitor events in arbitrary environments by acting in a selfconfigurable, self-organizing ad hoc manner, i.e. without the necessity of human interaction.Due to the fact that the sensor's energy, in most cases a battery that should last for the sensor's lifetime, is strongly limited, the sensor nodes are constrained in their computational power, memory and transmission range. As a consequence, the nodes can neither perform computational intensive tasks nor deliver meaningful results by acting on their own. Therefore, the sensor nodes have to cooperate to be