Skip to main content
Top
Published in: Wireless Personal Communications 3/2022

16-11-2021

Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and Methods

Authors: Rajesh K. Yadav, Rashmi Mishra

Published in: Wireless Personal Communications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some limitations. But in today's world, we are searching for the approach which provides cost-effective and time-saving that divulges the new idea and tactic in the envisioned arena. The study delivers the rapid opinion of this perception. In many areas, WSN is used such as in weather forecasting, military applications, battlefield applications, intrusion detection system. But these systems are having many limitations such as energy inefficiency, security, synchronization. For ensuring energy efficiency low-energy adaptive clustering hierarchy (LEACH) and advanced version of LEACH are used to augment the area of the sensor knobs. Author mentions and analyses the different types of protocols for prolonging the energy of sensor knobs. The research claimed had absorbed the security of the sensor knobs by implementing the different types of authentication measures which reduce attacks, capture attack, pin guessing attacks, and many more. This survey is very useful for beginners to understand the limitations and shortcomings of the cluster head and authentication protocols in WSN.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Azim, A., & Islam, M. M. (2009). A dynamic round-time based fixed low vigor adaptive clustering hierarchy for wireless sensor structure. In IEEE 9th Malaysia international conference, Malaysia (MICC) (pp. 922–926). Azim, A., & Islam, M. M. (2009). A dynamic round-time based fixed low vigor adaptive clustering hierarchy for wireless sensor structure. In IEEE 9th Malaysia international conference, Malaysia (MICC) (pp. 922–926).
2.
go back to reference Stallings, W., & Brown, L. (2011). Computer security: Principles and practice (2nd ed.). Stallings. Stallings, W., & Brown, L. (2011). Computer security: Principles and practice (2nd ed.). Stallings.
3.
go back to reference Internet of Things: Wireless Sensor Network. (2014). International Electrotechnical Commission IEC, White Paper, 2014-11-01. Internet of Things: Wireless Sensor Network. (2014). International Electrotechnical Commission IEC, White Paper, 2014-11-01.
4.
go back to reference Pawani, P., Pranaw, K., Andrei, G., & Mika, Y. (2014). Two-phase authentication protocol for wireless sensor structure in scattered IoT applications, Istanbul, 6 April 2014. In Wireless communications and networking conference (WCNC), 2014 IEEE (pp. 2728–2733). IEEE. Pawani, P., Pranaw, K., Andrei, G., & Mika, Y. (2014). Two-phase authentication protocol for wireless sensor structure in scattered IoT applications, Istanbul, 6 April 2014. In Wireless communications and networking conference (WCNC), 2014 IEEE (pp. 2728–2733). IEEE.
5.
go back to reference Fanian, F., & Rafsanjani, M. K. (2019). Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. Journal of Network and Computer Applications, 142, 111–142. Fanian, F., & Rafsanjani, M. K. (2019). Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. Journal of Network and Computer Applications, 142, 111–142.
6.
go back to reference Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor structure. IEEE Transactions on Wireless Communications, 1(4), 660–670. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor structure. IEEE Transactions on Wireless Communications, 1(4), 660–670.
9.
go back to reference Chang, R. S., & Kuo, C. J. (2006). An vigor efficient routing mechanism for wireless sensorstructure. In Proceedings of the international conference on advanced information networking and applications (AINA), Vienna, Austria (Vol. 2, pp. 308–312). Chang, R. S., & Kuo, C. J. (2006). An vigor efficient routing mechanism for wireless sensorstructure. In Proceedings of the international conference on advanced information networking and applications (AINA), Vienna, Austria (Vol. 2, pp. 308–312).
10.
go back to reference Zhixiang, D., & Bensheng, Q. (2007). Three-layered routing protocol for WSN based on LEACH algorithm. In Proceedings of the communications conference on wireless, mobile and sensor structure (CCWMSN), Shanghai, China (pp. 72–75). Zhixiang, D., & Bensheng, Q. (2007). Three-layered routing protocol for WSN based on LEACH algorithm. In Proceedings of the communications conference on wireless, mobile and sensor structure (CCWMSN), Shanghai, China (pp. 72–75).
11.
go back to reference Hong, J., Kook, J., Lee, S., Kwon, D., & Yi, S. (2009). T-LEACH: The method of threshold-based cluster head replacement for wireless sensor structure. Information Systems Frontiers, 11(5), 513–521. Hong, J., Kook, J., Lee, S., Kwon, D., & Yi, S. (2009). T-LEACH: The method of threshold-based cluster head replacement for wireless sensor structure. Information Systems Frontiers, 11(5), 513–521.
12.
go back to reference Liu, T., & Li, F. (2009). Power-efficient clustering routing protocol based on applications in wireless sensor network. In Proceedings of the international conference on wireless communications networking and mobile computing (WiCom), Beijing, China (pp. 1–6). Liu, T., & Li, F. (2009). Power-efficient clustering routing protocol based on applications in wireless sensor network. In Proceedings of the international conference on wireless communications networking and mobile computing (WiCom), Beijing, China (pp. 1–6).
13.
go back to reference Kumar, D., Aseri, T. C., & Patel, R. (2009). EEHC: Vigor efficient heterogeneous clustered scheme for wireless sensor structure. Computer Communications, 32(4), 662–667. Kumar, D., Aseri, T. C., & Patel, R. (2009). EEHC: Vigor efficient heterogeneous clustered scheme for wireless sensor structure. Computer Communications, 32(4), 662–667.
14.
go back to reference Bagherzadeh, J., & Samadzamini, M. (2009). A clustering algorithm for wireless sensor structure based on density of sensors. In Proceedings of the international conference on advances in mobile computing and multimedia (MoMM), Kuala Lumpur, Malaysia (pp. 594–598). Bagherzadeh, J., & Samadzamini, M. (2009). A clustering algorithm for wireless sensor structure based on density of sensors. In Proceedings of the international conference on advances in mobile computing and multimedia (MoMM), Kuala Lumpur, Malaysia (pp. 594–598).
15.
go back to reference Jia, J. G., He, Z. W., Kuang, J. M., & Mu, Y. H. (2010). An vigor consumption balanced clustering algorithm for wireless sensor network. In Proceedings of the international conferences on wireless communications networking and mobile computing (WiCOM), Chengdu, China (pp. 1–4). Jia, J. G., He, Z. W., Kuang, J. M., & Mu, Y. H. (2010). An vigor consumption balanced clustering algorithm for wireless sensor network. In Proceedings of the international conferences on wireless communications networking and mobile computing (WiCOM), Chengdu, China (pp. 1–4).
16.
go back to reference Kang, S. H., & Nguyen, T. (2012). Distance based thresholds for cluster head selection in wireless sensor structure. IEEE Communications Letters, 16(9), 1396–1399. Kang, S. H., & Nguyen, T. (2012). Distance based thresholds for cluster head selection in wireless sensor structure. IEEE Communications Letters, 16(9), 1396–1399.
17.
go back to reference Wang, A., Yang, D., & Sun, D. (2012). A clustering algorithm based on vigor information and cluster heads expectation for wireless sensor structure. Computers & Electrical Engineering, 38(3), 662–671. Wang, A., Yang, D., & Sun, D. (2012). A clustering algorithm based on vigor information and cluster heads expectation for wireless sensor structure. Computers & Electrical Engineering, 38(3), 662–671.
18.
go back to reference Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013). MODLEACH: A variant of LEACH for WSNs. In Proceedings of the international broadband and wireless computing, communication and applications (BWCCA), Compiegne, France (pp. 158–163). Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013). MODLEACH: A variant of LEACH for WSNs. In Proceedings of the international broadband and wireless computing, communication and applications (BWCCA), Compiegne, France (pp. 158–163).
19.
go back to reference Tao, Y., Zhang, Y., & Ji, Y. (2013). Flow-balanced routing for multi-hop clustered wireless sensor structure. Ad Hoc Networks, 11(1), 541–554. Tao, Y., Zhang, Y., & Ji, Y. (2013). Flow-balanced routing for multi-hop clustered wireless sensor structure. Ad Hoc Networks, 11(1), 541–554.
20.
go back to reference Nayak, S. P., Rai, S. C., & Pradhan, S. K. (2015). MERA: A multi-clustered vigor efficient routing algorithm in WSN. In Proceedings of the information technology, Bhubaneswar, India (pp. 37–42). Nayak, S. P., Rai, S. C., & Pradhan, S. K. (2015). MERA: A multi-clustered vigor efficient routing algorithm in WSN. In Proceedings of the information technology, Bhubaneswar, India (pp. 37–42).
21.
go back to reference Sabet, M., & Naji, H. R. (2015). A decentralized vigor efficient hierarchical cluster-basedrouting algorithm for wireless sensor structure. AEU-International Journal of Electronics and Communications, 69(5), 790–799. Sabet, M., & Naji, H. R. (2015). A decentralized vigor efficient hierarchical cluster-basedrouting algorithm for wireless sensor structure. AEU-International Journal of Electronics and Communications, 69(5), 790–799.
22.
go back to reference Agrawal, T., & Kushwah, R. S. (2015). Layered clustering routing protocol with overlapping cluster heads in WSN. In Proceedings of the communication systems and network technologies (CSNT), Gwalior, India (pp. 244–248). Agrawal, T., & Kushwah, R. S. (2015). Layered clustering routing protocol with overlapping cluster heads in WSN. In Proceedings of the communication systems and network technologies (CSNT), Gwalior, India (pp. 244–248).
23.
go back to reference Sabet, M., & Naji, H. (2016). An vigor efficient multi-level route-aware clustering algorithm for wireless sensor structure: A self-organized approach. Computers & Electrical Engineering, 56, 399–417. Sabet, M., & Naji, H. (2016). An vigor efficient multi-level route-aware clustering algorithm for wireless sensor structure: A self-organized approach. Computers & Electrical Engineering, 56, 399–417.
24.
go back to reference Shahraki, A., Kuchaki Rafsanjani, M., & Borumand Saeid, A. (2017). Hierarchical scatteredmanagement clustering protocol for wireless sensor structure. Telecommunication Systems, 65(1), 193–214. Shahraki, A., Kuchaki Rafsanjani, M., & Borumand Saeid, A. (2017). Hierarchical scatteredmanagement clustering protocol for wireless sensor structure. Telecommunication Systems, 65(1), 193–214.
25.
go back to reference Cengiz, K., & Dag, T. (2018). Vigor aware multi-hop routing protocol for WSNs. IEEE Access, 6, 2622–2633. Cengiz, K., & Dag, T. (2018). Vigor aware multi-hop routing protocol for WSNs. IEEE Access, 6, 2622–2633.
27.
go back to reference Kamran Khan, M., et al. (2018). EE-MRP: Vigor-efficient multistage routing protocol for wireless sensor structure. Wireless Communications and Mobile Computing, 2018, 13. Kamran Khan, M., et al. (2018). EE-MRP: Vigor-efficient multistage routing protocol for wireless sensor structure. Wireless Communications and Mobile Computing, 2018, 13.
28.
go back to reference Patil, S., Vijaya, K., Singha, S., & Jamil, R. (2012). A survey on authentication techniques for wireless sensor structure. International Journal of Applied Engineering Research, 7, 11. Patil, S., Vijaya, K., Singha, S., & Jamil, R. (2012). A survey on authentication techniques for wireless sensor structure. International Journal of Applied Engineering Research, 7, 11.
29.
go back to reference Alrababah, D., Shammari, E. A., & Alsuht, A. (2017). A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks. Alrababah, D., Shammari, E. A., & Alsuht, A. (2017). A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks.
31.
go back to reference Guermazi, A., & Abid, M. (2011). An efficient key distribution scheme to secure statistics-centricrouting protocols in hierarchical wireless sensor structure. Proceedings of Computer Science, 5, 208–215. Guermazi, A., & Abid, M. (2011). An efficient key distribution scheme to secure statistics-centricrouting protocols in hierarchical wireless sensor structure. Proceedings of Computer Science, 5, 208–215.
32.
go back to reference Yun, Z., Yuguang, F., & Yanchao, Z. (2008). Securing wireless sensor structure: A survey. IEEE Communication on Surveys Tutorials, 10, 6–28. Yun, Z., Yuguang, F., & Yanchao, Z. (2008). Securing wireless sensor structure: A survey. IEEE Communication on Surveys Tutorials, 10, 6–28.
33.
go back to reference Diop, A., Qi, Y., Wang, Q., & Hussain, S. (2013). An advanced survey on secure vigor-efficien thierarchical routing protocols in wireless sensor structure. Intermational Journal of Computer Science, 10, 490–500. Diop, A., Qi, Y., Wang, Q., & Hussain, S. (2013). An advanced survey on secure vigor-efficien thierarchical routing protocols in wireless sensor structure. Intermational Journal of Computer Science, 10, 490–500.
34.
go back to reference Modirkhazeni, A., Ithnin, N., & Ibrahim, O. (2010). Secure multipath routing protocols in wireless sensor structure: a security survey analysis. In Proceedings of the2nd international conference on network application protocols and services (NETAPPS 2010). Kedah, Malaysia (p. 22833). Modirkhazeni, A., Ithnin, N., & Ibrahim, O. (2010). Secure multipath routing protocols in wireless sensor structure: a security survey analysis. In Proceedings of the2nd international conference on network application protocols and services (NETAPPS 2010). Kedah, Malaysia (p. 22833).
35.
go back to reference Misra, S., & Dias, T. P. (2010). A simple, least-time, and vigor-efficient routing-protocol with one-level statistics aggregation for wireless sensor structure. Journal of System Software, 83, 852–860. Misra, S., & Dias, T. P. (2010). A simple, least-time, and vigor-efficient routing-protocol with one-level statistics aggregation for wireless sensor structure. Journal of System Software, 83, 852–860.
36.
go back to reference Shi, E., & Perrig, A. (2004). Designing secure sensor structure. IEEE Wireless Communication Magazine, 11, 38–43. Shi, E., & Perrig, A. (2004). Designing secure sensor structure. IEEE Wireless Communication Magazine, 11, 38–43.
37.
go back to reference Sahu, S., & Shandilya, S. K. (2010). A comprehensive survey on intrusion detection in WSN. International Journal of Information Technology and Knowledge Management, 2(2), 305–310. Sahu, S., & Shandilya, S. K. (2010). A comprehensive survey on intrusion detection in WSN. International Journal of Information Technology and Knowledge Management, 2(2), 305–310.
38.
go back to reference Mamatha, G., & Sharma, S. (2010). A highly secured approach against attacks in WSNS. International Journal of Computer Theory and Engineering, 2(5), 1793–8201. Mamatha, G., & Sharma, S. (2010). A highly secured approach against attacks in WSNS. International Journal of Computer Theory and Engineering, 2(5), 1793–8201.
39.
go back to reference Burg, A. (2003). Ad hoc structure specific attacks. Technische Universität München, Institut für Informatik, Seminar Paper, Seminar Ad Hoc Networking: concept, applications, and security. Burg, A. (2003). Ad hoc structure specific attacks. Technische Universität München, Institut für Informatik, Seminar Paper, Seminar Ad Hoc Networking: concept, applications, and security.
40.
go back to reference Jawandhiya, P. M., & Ghonge, M. M. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063–4071. Jawandhiya, P. M., & Ghonge, M. M. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063–4071.
41.
go back to reference Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless ad hoc structure. In Proceedings of 22nd annual joint conference on IEEE computer and communications societies (Infocom’03), San Francisco, CA (Vol. 3, pp. 1976–1986). Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless ad hoc structure. In Proceedings of 22nd annual joint conference on IEEE computer and communications societies (Infocom’03), San Francisco, CA (Vol. 3, pp. 1976–1986).
42.
go back to reference Godbole, N. (2010). Information system security. Wiley. Godbole, N. (2010). Information system security. Wiley.
43.
go back to reference Jangra, A., Goel, N., & Bhati, K. (2010). Security aspects in mobile ad hoc networks (MANETs): A big picture. International Journal of Electronics Engineering, 2(1), 189–196. Jangra, A., Goel, N., & Bhati, K. (2010). Security aspects in mobile ad hoc networks (MANETs): A big picture. International Journal of Electronics Engineering, 2(1), 189–196.
44.
go back to reference Jhaveri, R. H., et.al. (2012). A novel approach for grayhole and blackhole attacks in mobile ad-hoc structure. IEEE. Jhaveri, R. H., et.al. (2012). A novel approach for grayhole and blackhole attacks in mobile ad-hoc structure. IEEE.
45.
go back to reference Panos, C., Xenakis, C., & Stavrakakis, I. (2009). IEEE Fellow—A novel intrusion detection system for WSNs. Panos, C., Xenakis, C., & Stavrakakis, I. (2009). IEEE Fellow—A novel intrusion detection system for WSNs.
46.
go back to reference Jhaveri, R. H., et al. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based WSNs. IEEE. Jhaveri, R. H., et al. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based WSNs. IEEE.
47.
go back to reference Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P., & Tiny P. K. (2004). Securing sensor structure with public key technology. In: Proceedings of ACM workshop security of ad hoc sensor structure (pp. 59–64). Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P., & Tiny P. K. (2004). Securing sensor structure with public key technology. In: Proceedings of ACM workshop security of ad hoc sensor structure (pp. 59–64).
48.
go back to reference Watro, R. (2006). A dynamic user authentication scheme for wireless sensor structure, ser. In Proceedings of the IEEE international conference on sensor structure, ubiquitous, and trustworthy computing (Vol. 1). IEEE Computer Society. Watro, R. (2006). A dynamic user authentication scheme for wireless sensor structure, ser. In Proceedings of the IEEE international conference on sensor structure, ubiquitous, and trustworthy computing (Vol. 1). IEEE Computer Society.
49.
go back to reference Panos, C., Xenakis, C., & Stavrakakis, I. (2009). A novel intrusion detection system for WSNs international conference on security and cryptography (SECRYPT). Panos, C., Xenakis, C., & Stavrakakis, I. (2009). A novel intrusion detection system for WSNs international conference on security and cryptography (SECRYPT).
51.
go back to reference Rajavaram, S., Shah, H., Shanbhag, V., Undercoffer, J., & Joshi, A. (2002). Neighborhood watch: An intrusion detection and response protocol for mobile ad hoc structure. In Student research conference. University of Maryland at Baltiadditional County (UMBC). Rajavaram, S., Shah, H., Shanbhag, V., Undercoffer, J., & Joshi, A. (2002). Neighborhood watch: An intrusion detection and response protocol for mobile ad hoc structure. In Student research conference. University of Maryland at Baltiadditional County (UMBC).
52.
go back to reference Sharma, N., & Sharma, A. (2012). The black-hole node attack in MANET. In 2012 second international conference on advanced computing & communication technologies (pp. 546–550). IEEE. Sharma, N., & Sharma, A. (2012). The black-hole node attack in MANET. In 2012 second international conference on advanced computing & communication technologies (pp. 546–550). IEEE.
55.
go back to reference Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159–194. Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159–194.
56.
go back to reference Bouam, S., & Othman, J. B. (2003). Statistics security in ad hoc structure using multipath routing. In Proceedings of the 14th IEEE PIMRC (pp. 1331–1335). Bouam, S., & Othman, J. B. (2003). Statistics security in ad hoc structure using multipath routing. In Proceedings of the 14th IEEE PIMRC (pp. 1331–1335).
57.
go back to reference Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor structure. In Proceedings of IEEE Globecom, Washington, DC, USA (pp. 986–990). Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor structure. In Proceedings of IEEE Globecom, Washington, DC, USA (pp. 986–990).
58.
go back to reference Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two-factor user authentication in wireless sensor structure. In IEEE 6th international conference on wireless and mobile computing, networking and communications (pp. 600–606). IEEE. Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two-factor user authentication in wireless sensor structure. In IEEE 6th international conference on wireless and mobile computing, networking and communications (pp. 600–606). IEEE.
59.
go back to reference Ko, L. C. (2008). A novel dynamic user authentication scheme for wireless sensor structure. In IEEE international symposium on wireless communication systems (ISWCS '08) (pp. 608–612). Ko, L. C. (2008). A novel dynamic user authentication scheme for wireless sensor structure. In IEEE international symposium on wireless communication systems (ISWCS '08) (pp. 608–612).
60.
go back to reference Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor structure. In The second international conference on sensor technologies and applications (pp. 657–660). Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor structure. In The second international conference on sensor technologies and applications (pp. 657–660).
61.
go back to reference Das, M. L. (2009). Two-factor user authentication in wireless sensor structure. IEEE Transactions in Wireless Communication, 8(3), 1086–1090. Das, M. L. (2009). Two-factor user authentication in wireless sensor structure. IEEE Transactions in Wireless Communication, 8(3), 1086–1090.
62.
go back to reference Jamil, N., Sameon, S. S., & Mahmood, R. (2010). A user authentication scheme based on identity-bits commitment for wireless sensor structure. In Second international conference on network applications, protocols and services (pp. 61–66). Jamil, N., Sameon, S. S., & Mahmood, R. (2010). A user authentication scheme based on identity-bits commitment for wireless sensor structure. In Second international conference on network applications, protocols and services (pp. 61–66).
64.
go back to reference Huang, H. F., Chang, Y. F., & Liu, C. H. (2010). Enhancement of two-factor user authentication in wireless sensor structure. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10) (pp. 27–30). Huang, H. F., Chang, Y. F., & Liu, C. H. (2010). Enhancement of two-factor user authentication in wireless sensor structure. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10) (pp. 27–30).
65.
go back to reference Chen, T. H., & Shih, W. K. (2010). A robust mutual authentication protocol for wireless sensor structure. ETRI Journal, 32(5), 704–712. Chen, T. H., & Shih, W. K. (2010). A robust mutual authentication protocol for wireless sensor structure. ETRI Journal, 32(5), 704–712.
66.
go back to reference Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor structure.” Sensors, 10(3), 2450–2459. Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor structure.” Sensors, 10(3), 2450–2459.
67.
go back to reference Butun, I., & Shankar, R. (2011). Advanced two tier using authentication scheme for heterogeneous WSN. In 2nd IEEE CCNC research student workshop. Butun, I., & Shankar, R. (2011). Advanced two tier using authentication scheme for heterogeneous WSN. In 2nd IEEE CCNC research student workshop.
68.
go back to reference Kumar, D., Aseri, T. C., & Patel, R. B. (2011). Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor structure. International Journal of Information Technology, Communications and Convergence, 1(2), 130–145. Kumar, D., Aseri, T. C., & Patel, R. B. (2011). Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor structure. International Journal of Information Technology, Communications and Convergence, 1(2), 130–145.
69.
go back to reference He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor structure. Ad Hoc & Sensor Wireless Structure, 0, 1–11. He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor structure. Ad Hoc & Sensor Wireless Structure, 0, 1–11.
70.
go back to reference Yoo, S. G., Park, K. Y., & Kim, J. (2012). A security-performance-balanced user authentication scheme for wireless sensor structure. International Journal of Scattered Sensor Structure, 2012, 1–11. Yoo, S. G., Park, K. Y., & Kim, J. (2012). A security-performance-balanced user authentication scheme for wireless sensor structure. International Journal of Scattered Sensor Structure, 2012, 1–11.
71.
go back to reference Tan, Z. (2011). Cryptanalyses of a two-factor user authentication scheme in wireless sensor structure. Advances in Information Sciences and Service Sciences, 3(4), 117–126. Tan, Z. (2011). Cryptanalyses of a two-factor user authentication scheme in wireless sensor structure. Advances in Information Sciences and Service Sciences, 3(4), 117–126.
72.
go back to reference Xue, K., Ma, C., Hong, P., & Ding, R. (2012). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor structure. Journal of Structure and Computer Applications, 36, 316–323. Xue, K., Ma, C., Hong, P., & Ding, R. (2012). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor structure. Journal of Structure and Computer Applications, 36, 316–323.
73.
go back to reference Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor structure. Elektronika IR Elektrotechnika, 19, 109–116. Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor structure. Elektronika IR Elektrotechnika, 19, 109–116.
74.
go back to reference Turkanovic, M., Brumen, B., & Holbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor structure based on the internet of things notion. Ad Hoc Structure, 20, 96–112. Turkanovic, M., Brumen, B., & Holbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor structure based on the internet of things notion. Ad Hoc Structure, 20, 96–112.
75.
go back to reference Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor structure. Ad Hoc Structure, 36(1), 58–80. Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor structure. Ad Hoc Structure, 36(1), 58–80.
76.
go back to reference Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks, 36, 152–176. Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks, 36, 152–176.
77.
go back to reference Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor structure. Sensors, 13, 9589–9603. Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor structure. Sensors, 13, 9589–9603.
78.
go back to reference Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor structure. Computer Structure, 101, 42–62. Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor structure. Computer Structure, 101, 42–62.
80.
go back to reference Vaidya, B., Silva, J. S., & Rodrigues, J. J. (2009). Robust dynamic user authentication scheme for wireless sensor structure. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks (pp. 88–91). Vaidya, B., Silva, J. S., & Rodrigues, J. J. (2009). Robust dynamic user authentication scheme for wireless sensor structure. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks (pp. 88–91).
81.
go back to reference Chatterjee, K., De, A., & Gupta, D. (2015). A secure and efficient authentication protocol in wireless sensor network. Wireless Personnal Communication, 81, 17–37. Chatterjee, K., De, A., & Gupta, D. (2015). A secure and efficient authentication protocol in wireless sensor network. Wireless Personnal Communication, 81, 17–37.
82.
go back to reference Almutairi, A. F., Yousef, A. B., & Mishal, A. G. (2019). Improving the performance of wireless network in residential areas in Kuwait. Journal of Engineering Research, 7(4), 215–224. Almutairi, A. F., Yousef, A. B., & Mishal, A. G. (2019). Improving the performance of wireless network in residential areas in Kuwait. Journal of Engineering Research, 7(4), 215–224.
84.
go back to reference Singh, S., Kumar, S., Nayyar, A., Al-Turjman, F., & Mostarda, L. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315–74325. Singh, S., Kumar, S., Nayyar, A., Al-Turjman, F., & Mostarda, L. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315–74325.
86.
go back to reference Yadav, R. K., & Mishra, R. (2021). Analysis of DEEC deviations in heterogeneous WSNs: A survey. In V. Bhateja, S. C. Satapathy, C. M. Travieso-Gonzalez, & W. Flores-Fuentes (Eds.), Computer communication, networking and IoT. Lecture notes in networks and systems. (Vol. 197). Singapore: Springer. https://doi.org/10.1007/978-981-16-0980-0_22CrossRef Yadav, R. K., & Mishra, R. (2021). Analysis of DEEC deviations in heterogeneous WSNs: A survey. In V. Bhateja, S. C. Satapathy, C. M. Travieso-Gonzalez, & W. Flores-Fuentes (Eds.), Computer communication, networking and IoT. Lecture notes in networks and systems. (Vol. 197). Singapore: Springer. https://​doi.​org/​10.​1007/​978-981-16-0980-0_​22CrossRef
Metadata
Title
Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and Methods
Authors
Rajesh K. Yadav
Rashmi Mishra
Publication date
16-11-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09265-7

Other articles of this Issue 3/2022

Wireless Personal Communications 3/2022 Go to the issue