Authenticated ad hoc routing at the link layer for mobile systems
Wireless Networks
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
A secure hierarchical model for sensor network
ACM SIGMOD Record
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
End-to-end support for statistical quality of service in heterogeneous mobile ad hoc networks
Computer Communications
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
On the development of adaptive and self-dependent secure routing for wireless sensor networks
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Error compensation algorithm in wireless sensor networks synchronisation
International Journal of Sensor Networks
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Energy consumption monitoring for sensor nodes in SNAP
International Journal of Sensor Networks
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) are expected to be deployed on a large scale in the near future. WSNs play a key role in gathering information about various environmental phenomena. When sensor nodes are deployed in hostile environments or in some security-sensitive applications, some security measures such as confidentiality and integrity are highly required. Although, a significant number of researchers have put effort on developing sensor network structure and routing protocols, very less emphasis was given to the security issues. For example, many routing protocols for WSNs have been proposed, but most of them have been designed without security in mind. In this paper, security challenges and problems in WSNs are first analysed and summarised. An overview of the current solutions on secure routing in WSNs is then briefly described. Finally, a secure routing protocol for large scale WSNs, called Secure and Energy Efficient Protocol (SEEP) is presented. SEEP operates on a clustered network and provides security at both intra- and inter-cluster levels. The strength of SEEP stems from its ability to meet conflicting goals of providing high-level security while maximising energy efficiency. Performance evaluation of the proposed protocol show that SEEP can achieve a better level of security with less computational and communication overhead when compared to other schemes.