Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jiang Du ; Dept. of Comput. Sci. & Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China ; Su Peng

Recently, with the development of wireless sensor networks (WSNs), many new routing protocols have been designed for WSNs. Routing protocols in WSNs, however, might differ depending on the application and network architecture. Furthermore, WSNs are exposed to numerous routing security threats. Therefore, it is headachy for us to choose secure routing protocols for application in WSNs. In respect that the choice of secure routing protocols for WSNs is intimately related with the application requirements and routing protocol characteristics and the attacks on routing protocol, there is no "panacea" secure routing protocol. In this paper, we present a table that guides us to choose appropriate secure routing protocols for a particular application in WSNs.

Published in:

Multimedia Information Networking and Security, 2009. MINES '09. International Conference on  (Volume:2 )

Date of Conference:

18-20 Nov. 2009