Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


A Survey of Wireless Sensor Network Security and Routing Techniques

Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal and Kashif Naseer Qureshi
Faculty of Computing, Universiti Teknologi Malaysia, 81310 Skudai, Johor Bahru, Malaysia
Research Journal of Applied Sciences, Engineering and Technology  2015  11:1016-1026
http://dx.doi.org/10.19026/rjaset.9.2595  |  © The Author(s) 2015
Received: December ‎10, ‎2014  |  Accepted: January ‎27, ‎2015  |  Published: April 15, 2015

Abstract

The main purpose of the study is to review the evolution of wireless sensor network security and routing techniques. Recent years have seen tremendous growth in Wireless Sensor Networks (WSNs). As WSN’s become more and more crucial to everyday life, their security and trust become a primary concern. However because of the nature of WSNs, security design can be challenging. Trust-aware routing protocols play a vital role in security of Wireless Sensor Networks (WSNs). The review study provides an overview of Wireless Sensor Network (WSN) and discusses security issues and the routing techniques for high quality of service and efficient performance in a WSN. In order to identify gaps and propose research directions in WSN security and routing techniques, the study surveys the existing body of literature in this area. The main focus is on trust concepts and trust based approaches for wireless sensor networks. The study also highlights the difference between trust and security in the context of WSNs. The trust and security are interchangeable with each other when we elaborate a secure system and not same. Various surveys conducted about trust and reputation systems in ad hoc and sensor networks are studied and compared. Finally we summarize the different trust aware routing schemes.

Keywords:

Attacks, blackhole , protocols , security, trust , WSN,


References


Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved