ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey On Comparison Of Secure Routing Protocols in Wireless Sensor Networks

Journal: International Journal of Wireless Communications and Networking Technologies (IJWCNT) (Vol.5, No. 3)

Publication Date:

Authors : ; ;

Page : 16-20

Keywords : Blackhole attack; Sybil attack; SPIN; LEACH; TARF; SIGF; LEAP; WSN; Wormhole attack.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless Sensor Network (WSN) at the present time is a major growing technology. Sensor networks provide a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications including security and surveillance, control, actuation and maintenance of complex systems but at the same time offer numerous challenges due to their peculiarities.WSN face security attacks already experienced by Internet and wireless ad hoc networks. In this paper, we present the attacks on WSN and compare some secure routing protocols of sensor networks.

Last modified: 2016-06-08 19:40:27