On security of opportunistic routing protocol in wireless sensor networks

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the passage of time, Wireless Sensor Networks (WSNs) gain importance and have become one of the most fascinating areas of research in the past few years. Reliable and efficient data routing, that helps the data to reach its destination, remains the bottom line of research problem. Hence, various routing protocols are developed which are based on different parameters. But opportunistic routing has fascinated many researchers these days because of its broadcasting nature that makes it more efficient than the old routing methods. However, while routing in this sensor network the loss of data takes place because of its security lack. Therefore, security is also a challenging issue with the routing of WSN. This paper presents an overview of the WSN, its architecture, applications of WSN in different fields presented. An overview of the security aspect of routing in WSN is given. Finally, a comparison of different security methods of opportunistic routing is also presented.

Cite

CITATION STYLE

APA

Sharma, A., & Singh, Y. (2020). On security of opportunistic routing protocol in wireless sensor networks. In Lecture Notes in Electrical Engineering (Vol. 597, pp. 407–419). Springer. https://doi.org/10.1007/978-3-030-29407-6_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free