A new approach to the maximum-flow problem
Journal of the ACM (JACM)
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Error-Control Coding for Data Networks
Error-Control Coding for Data Networks
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lexicographically optimal balanced networks
IEEE/ACM Transactions on Networking (TON)
Denial of Service in Sensor Networks
Computer
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Performance Study of a Multipath Routing Method for Wireless Mobile Ad Hoc Networks
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 1st international conference on Embedded networked sensor systems
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Node-disjointness-based multipath routing for mobile ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A self-stabilizing algorithm for the maximum flow problem
Distributed Computing
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Towards resilient geographic routing in WSNs
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
SecRout: A Secure Routing Protocol for Sensor Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
Secure cell relay routing protocol for sensor networks: Research Articles
Wireless Communications & Mobile Computing - Wireless Network Security
A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks
DSSNS '06 Proceedings of the Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Security Issues in Wireless Sensor Networks
ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
A secure alternate path routing in sensor networks
Computer Communications
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Secure Multipath Routing Protocol for Wireless Sensor Networks
ICDCSW '07 Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
Computer Communications
Secure Multipath Routing Scheme for Mobile Ad Hoc Network
DASC '07 Proceedings of the Third IEEE International Symposium on Dependable, Autonomic and Secure Computing
Secure multi-path in sensor networks
Proceedings of the 5th international conference on Embedded networked sensor systems
Multipath Routing Based Secure Data Transmission in Ad Hoc Networks
WIMOB '06 Proceedings of the 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Distributed algorithms for secure multipath routing in attack-resistant networks
IEEE/ACM Transactions on Networking (TON)
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multiconstrained QoS multipath routing in wireless sensor networks
Wireless Networks
A Secure Routing Protocol for Wireless Embedded Networks
RTCSA '08 Proceedings of the 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
IEEE Transactions on Dependable and Secure Computing
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
On multipath routing in multihop wireless networks: security, performance, and their tradeoff
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Secure and reliable data aggregation for wireless sensor networks
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Performance analysis of secure multipath routing protocols for mobile ad hoc networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
The design space of wireless sensor networks
IEEE Wireless Communications
IEEE Communications Magazine
Journal of Network and Computer Applications
Dual-verifiers DVS with message recovery for tolerant routing in wireless sensor networks
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Secure routing protocol with anomaly detection in heterogeneous wireless sensor networks
International Journal of Mobile Network Design and Innovation
Multipath Routing Techniques in Wireless Sensor Networks: A Survey
Wireless Personal Communications: An International Journal
International Journal of Ad Hoc and Ubiquitous Computing
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
Hi-index | 0.00 |
Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on the network's type and protocol's operation. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. However, taking into consideration that WSN applications need to support critical infrastructures (i.e., military, healthcare, environmental, etc.), security becomes an issue. And since these infrastructures are highly depended on the availability of resources, focus has especially been given to support a secure, resilient and reliable environment, with multipath routing being one of the added functionalities. The need for security in sensitive WSN application has lead researchers to design secure multipath routing protocols from the beginning or design security extensions for existing protocols. This paper surveys the current state-of-the-art of secure multipath routing protocols in WSNs, classifies the protocols in categories according to their security-related operational objectives, defines a new threat model in the routing procedure and identifies open research issues in the area.