Loading

Research Trends in Secure Routing Protocols and Communication System in WSNs
Somu Parande1, Jayashree D. Mallapur2

1Somu Parande*, Assistant Professor, Department of Electronics & Communication, Basaveshwar Engineering College, Bagalkot, Karnataka, India.
2Jayashree D. Mallapur*, Professor, Department of Electronics & Communication, Basaveshwar Engineering College, Bagalkot, Karnataka, India

Manuscript received on October 16, 2019. | Revised Manuscript received on 23 October, 2019. | Manuscript published on November 10, 2019. | PP: 3413-3421 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4536119119/2019©BEIESP | DOI: 10.35940/ijitee.A4536.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: At present, Wireless Sensor Networks (WSNs) is fastest growing technology which extensively adopting for various application services including; weather monitoring, traffic prediction, surveillance, research and academic fields etc. As the sensor nodes are randomly deployed in wireless environment, security metrics becomes most promising challenge where communication wirelesses networks facing today. In WSNs, sensor nodes acquires various security concern i.e. vulnerabilities, threats and malicious attacks. Due to the limited resource constraints like bandwidth demand, limited memory, computational cost and minimum energy consumption of sensor nodes makes the network security protocols unachievable. In this context, this comprehensive study provides extensive review of WSNs, various challenges mainly related to security attacks and their solution strategies to strengthen the network performance. The significant contribution of this survey study is to provide the comprehensive report on standard secure routing schemes introduced in the literature and pertaining them to secure and non-secure routing protocols for strengthening the WSNs lifetime. Furthermore, the study considers the most frequently used security protocols published between 2010 to 2019, and investigates the major issues towards the security provisions in WSN, which may help for designing a futuristic routing protocol for any WSNs.
Keywords: Cryptography Algorithms; LEACH; Security Attack, Secure Routing Protocol, Wireless Sensor Network.
Scope of the Article: Communication