Title :
Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks
Author :
Du, Jiang ; Peng, Su
Author_Institution :
Dept. of Comput. Sci. & Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China
Abstract :
Recently, with the development of wireless sensor networks (WSNs), many new routing protocols have been designed for WSNs. Routing protocols in WSNs, however, might differ depending on the application and network architecture. Furthermore, WSNs are exposed to numerous routing security threats. Therefore, it is headachy for us to choose secure routing protocols for application in WSNs. In respect that the choice of secure routing protocols for WSNs is intimately related with the application requirements and routing protocol characteristics and the attacks on routing protocol, there is no "panacea" secure routing protocol. In this paper, we present a table that guides us to choose appropriate secure routing protocols for a particular application in WSNs.
Keywords :
routing protocols; telecommunication security; wireless sensor networks; secure routing protocol; wireless sensor networks; Application software; Computer science; Computer security; Delay; Network topology; Protection; Quality of service; Routing protocols; Sensor phenomena and characterization; Wireless sensor networks; Wireless Sensor Networks (WSNs); applications; attacks; countermeasures; routing protocols;
Conference_Titel :
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3843-3
Electronic_ISBN :
978-1-4244-5068-8
DOI :
10.1109/MINES.2009.14