|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 181 - Issue 24 |
| Published: Oct 2018 |
| Authors: Norhan Abdel-Hamid, Labib M. Labib, Abdelhameed Ibrahim, Hesham A. Ali |
10.5120/ijca2018917969
|
Norhan Abdel-Hamid, Labib M. Labib, Abdelhameed Ibrahim, Hesham A. Ali . Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques. International Journal of Computer Applications. 181, 24 (Oct 2018), 7-16. DOI=10.5120/ijca2018917969
@article{ 10.5120/ijca2018917969,
author = { Norhan Abdel-Hamid,Labib M. Labib,Abdelhameed Ibrahim,Hesham A. Ali },
title = { Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques },
journal = { International Journal of Computer Applications },
year = { 2018 },
volume = { 181 },
number = { 24 },
pages = { 7-16 },
doi = { 10.5120/ijca2018917969 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2018
%A Norhan Abdel-Hamid
%A Labib M. Labib
%A Abdelhameed Ibrahim
%A Hesham A. Ali
%T Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques%T
%J International Journal of Computer Applications
%V 181
%N 24
%P 7-16
%R 10.5120/ijca2018917969
%I Foundation of Computer Science (FCS), NY, USA
Wireless Sensor Networks (WSNs), considered as one of the successfully distributed applications that are currently used to acquire knowledge and collect information from the wirelessly devices seamlessly. The distinctive architecture of WSNs contributed to deploy it in an extensive range of modern industrial applications such as surveillance, monitoring, predicted, and automated control systems which can help in bridging the divide between user requirements and technologies. Moreover, WSNs face several challenges such as Topology control, Robustness, Placement, Power consuming, Scalability, Reliability, Resource Utilization, QoS, Data availability and Security. The main objective of this paper can be classified into two parts; the first one is to illustrate WSNs architecture, applications, challenges, and recent research directions. The second one is highlighting on routing and security design issues, security threats, countermeasures against network layer attacks to achieve secure routing, as the efficiency of the communication process is mainly based on determining the best path between nodes. We also highlight the advantages and performance issues of each secure routing technique. At the end of this paper the possible future research areas are concluded.