Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and Methods

被引:0
作者
Rajesh K. Yadav
Rashmi Mishra
机构
[1] Delhi Technological University,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2022年 / 123卷
关键词
Wireless sensor systems; Cluster-heads; LEACH; Authentication; Classical routing protocols;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some limitations. But in today's world, we are searching for the approach which provides cost-effective and time-saving that divulges the new idea and tactic in the envisioned arena. The study delivers the rapid opinion of this perception. In many areas, WSN is used such as in weather forecasting, military applications, battlefield applications, intrusion detection system. But these systems are having many limitations such as energy inefficiency, security, synchronization. For ensuring energy efficiency low-energy adaptive clustering hierarchy (LEACH) and advanced version of LEACH are used to augment the area of the sensor knobs. Author mentions and analyses the different types of protocols for prolonging the energy of sensor knobs. The research claimed had absorbed the security of the sensor knobs by implementing the different types of authentication measures which reduce attacks, capture attack, pin guessing attacks, and many more. This survey is very useful for beginners to understand the limitations and shortcomings of the cluster head and authentication protocols in WSN.
引用
收藏
页码:2777 / 2833
页数:56
相关论文
共 27 条
[21]   An Energy-Efficient Learning Automata and Cluster-Based Routing Algorithm for Wireless Sensor Networks [J].
Karmakonda, Karthik ;
Das, M. Swamy ;
Ravi, Guguloth .
CONTEMPORARY MATHEMATICS, 2023, 4 (03) :488-504
[22]   Enhancing Lifetime and Quality of Data in Cluster-based Hierarchical Routing Protocol for Wireless Sensor Network [J].
Jan, Mian Ahmad ;
Nanda, Priyadarsi ;
He, Xiangjian ;
Liu, Ren Ping .
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, :1400-1407
[23]   RFID AUTHENTICATION PROTOCOLS BASED ON ELLIPTIC CURVES A Top-Down Evaluation Survey [J].
Hutter, Michael .
SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, :101-110
[24]   Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN [J].
E. Golden Julie ;
S. Tamilselvi ;
Y. Harold Robinson .
Wireless Personal Communications, 2016, 91 :1171-1189
[25]   Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN [J].
Julie, E. Golden ;
Tamilselvi, S. ;
Robinson, Y. Harold .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) :1171-1189
[26]   A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks [J].
Daanoune, Ikram ;
Abdennaceur, Baghdad ;
Ballouk, Abdelhakim .
AD HOC NETWORKS, 2021, 114
[27]   PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey [J].
Mall, Priyanka ;
Amin, Ruhul ;
Das, Ashok Kumar ;
Leung, Mark T. ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8205-8228