Friday 19th of April 2024
 

Security Analysis of Routing Protocols in Wireless Sensor Networks


Mohammad Sadeghi, Farshad Khosravi, Kayvan Atefi and Mehdi Barati

In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of these protocols to meet their security requirements. At last some simulation results of these protocols that have been done by their designer are mentioned.

Keywords: Security Analysis, Routing Protocols, Wireless Sensor Networks (WSN), attacks in network

Download Full-Text


ABOUT THE AUTHORS

Mohammad Sadeghi
Faculty of Computer and Mathematical Sciences, UiTM,Shah Alam,Malaysia

Farshad Khosravi
Faculty of Electrical Engineering, Islamic Azad University, Eslam Abad Gharb, Iran

Kayvan Atefi
Faculty of Computer and Mathematical Sciences, UiTM,Shah Alam,Malaysia

Mehdi Barati
Faculty of Computer Sciences,UPM ,Malaysia


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »