A Review on Secure Routing Protocols in Wireless Sensor Networks for IOT Applications
Author(s):
Mohammed Abdul Azeem, Dr. Khaleel-ur-Rahman khan, Sailaja Gokavarapu
Keywords:
Security; Routing; IoT; WSNs; 6LowPAN
Abstract
The Wireless Sensor Network (WSN) in present generation has gained its popularity due to its applicability nature in various areas. The cost and structural complexity of a WSN are very low. In addition, through the continuous improvement, WSN has been utilizing in vast applications. The system interconnected with computing device, digital and mechanical instruments, animals, people or other objects is called Internet of things(IoT). The IoT allows objects to be sensed or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems. In general, a WSN consists of a sensor node (SN) that gathers the data from the atmosphere/environment. An SN exhibit very low power battery (LPB) and if the battery power gets drained SN will stop its functionality. Once the battery power is drained, it is impossible to recharge it back due to the wide spread network structure. The unfunctionality of an SN may lead to failure of the routing protocol. Commonly a routing protocol facilitates an efficient routing path among the SNs. The security of data over the WSN is always a biggest issue which needs to be resolved. Many of the researchers have explained their views for energy efficient, secure routing protocol for a WSN. It is apparent that security will pose a fundamental enabling factor for the successful deployment and use of most IoT applications and in particular secure routing among IoT sensor nodes, thus mechanisms need to be designed to provide secure routing communications for devices enabled by the IoT technology.This survey analyzes existing routing protocols and mechanisms to secure routing communications in IoT, as well as the open research issues. We further analyze how existing approaches ensure secure routing in IoT, their weaknesses, threats to secure routing in IoT and the open challenges and strategies for future research work for a better secure IoT routing.
Article Details
Unique Paper ID: 144817

Publication Volume & Issue: Volume 4, Issue 4

Page(s): 127 - 138
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews