Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Secured and Energy Efficient Routing Protocol for Wireless Sensor Networks

Rana Asif Rehman, Muhammad Burhan, Jaydip Sen


The sensor network is a broadcast network in which any signal can be captured by adversaries at any time. These features make wireless ad-hoc sensor networks more vulnerable than wired networks. This presents real challenges in the implementation of the following security requirements for WSNs. There are important key concepts were discussed in literature like Data Confidentiality, message authentication, data integrity in wireless sensor network. In the past decade many techniques have been proposed in the literature for detection and prevention of black hole attack in sensor network. The literature survey showing techniques suffers from very little false positives. In this research, suggests some feasible security model to further enhancement to tackling of black hole attack in the wireless sensor network.


Wireless Sensor Networks, Black Hole Attack, Grey Hole Attack, Network Security.

Full Text:



C. Karlof and D. Wagner. “Secure routing in wireless sensor networks: Attacks and countermeasures”. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2– 3):293–315, September 2003.

Deng, Jing, Richard Han, and Shivakant Mishra. "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks." International Conference on Dependable Systems and Networks, 2004. IEEE, 2004.

Fang, Xi, et al. "Smart grid—The new and improved power grid: A survey." IEEE communications surveys & tutorials 14.4 (2011): 944-980.

Ganeriwal, Saurabh, et al. "Secure time synchronization service for sensor networks." Proceedings of the 4th ACM workshop on Wireless security. ACM, 2005.

Haller, Stephan, Stamatis Karnouskos, and Christoph Schroth. "The internet of things in an enterprise context." Future Internet Symposium. Springer, Berlin, Heidelberg, 2008.

Martignoni, Lorenzo, Mihai Christodorescu, and Somesh Jha. "Omniunpack: Fast, generic, and safe unpacking of malware." Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 2007.

Mishra, Balmukund, and Yashwant Singh. "Comparative Analysis of WSN MAC Protocols and Node Clone Attack." (2015).

Pathan, Al-Sakib Khan, Hyung-Woo Lee, and Choong Seon Hong. "Security in wireless sensor networks: issues and challenges." 2006 8th International Conference Advanced Communication Technology. Vol. 2. IEEE, 2006.

Raya, Maxim, and Jean-Pierre Hubaux. "The security of vehicular ad hoc networks." Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. ACM, 2005.

Sakai, Kazuya, et al. "Secure Data Communications in Wireless Networks Using Multi-Path Avoidance Routing." IEEE Transactions on Wireless Communications 18.10 (2019): 4753-4767.

Spekman, Robert E., and Edward W. Davis. "Risky business: expanding the discussion on risk and the extended enterprise." International Journal of Physical Distribution & Logistics Management 34.5 (2004): 414-433.

Sturgeon, Timothy J. "Modular production networks: a new American model of industrial organization." Industrial and corporate change 11.3 (2002): 451-496.

Wang, Chenmeng, et al. "Integration of networking, caching, and computing in wireless systems: A survey, some research issues, and challenges." IEEE Communications Surveys & Tutorials 20.1 (2017): 7-38.

Xiao, Yang, et al. "A survey of key management schemes in wireless sensor networks." Computer communications 30.11-12 (2007): 2314-2341.

Yan, Chenyu, et al. "Improving cost, performance, and security of memory encryption and authentication." ACM SIGARCH Computer Architecture News. Vol. 34. No. 2. IEEE Computer Society, 2006.

Zhang, Wensheng, et al. "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks." Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. ACM, 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.