Skip to main content

Advertisement

Log in

Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and Methods

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some limitations. But in today's world, we are searching for the approach which provides cost-effective and time-saving that divulges the new idea and tactic in the envisioned arena. The study delivers the rapid opinion of this perception. In many areas, WSN is used such as in weather forecasting, military applications, battlefield applications, intrusion detection system. But these systems are having many limitations such as energy inefficiency, security, synchronization. For ensuring energy efficiency low-energy adaptive clustering hierarchy (LEACH) and advanced version of LEACH are used to augment the area of the sensor knobs. Author mentions and analyses the different types of protocols for prolonging the energy of sensor knobs. The research claimed had absorbed the security of the sensor knobs by implementing the different types of authentication measures which reduce attacks, capture attack, pin guessing attacks, and many more. This survey is very useful for beginners to understand the limitations and shortcomings of the cluster head and authentication protocols in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Azim, A., & Islam, M. M. (2009). A dynamic round-time based fixed low vigor adaptive clustering hierarchy for wireless sensor structure. In IEEE 9th Malaysia international conference, Malaysia (MICC) (pp. 922–926).

  2. Stallings, W., & Brown, L. (2011). Computer security: Principles and practice (2nd ed.). Stallings.

    Google Scholar 

  3. Internet of Things: Wireless Sensor Network. (2014). International Electrotechnical Commission IEC, White Paper, 2014-11-01.

  4. Pawani, P., Pranaw, K., Andrei, G., & Mika, Y. (2014). Two-phase authentication protocol for wireless sensor structure in scattered IoT applications, Istanbul, 6 April 2014. In Wireless communications and networking conference (WCNC), 2014 IEEE (pp. 2728–2733). IEEE.

  5. Fanian, F., & Rafsanjani, M. K. (2019). Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. Journal of Network and Computer Applications, 142, 111–142.

    Google Scholar 

  6. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor structure. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Google Scholar 

  7. Tarhani, M., Kavian, Y. S., & Siavoshi, S. (2014). SEECH: Scalable vigor efficient clustering hierarchy protocol in wireless sensor structure. IEEE Sensors Journal, 14, 3944–3954. https://doi.org/10.1109/JSEN.2014.2358567

    Article  Google Scholar 

  8. Tanwar, S., Tyagi, S., Kumar, N., & Obaidat, M. S. (2019). LA-MHR: Learning automata based multilevel heterogeneous routing for opportunistic shared spectrum access to enhance lifetime of WSN. IEEE Systems Journal, 13, 313–323. https://doi.org/10.1109/JSYST.2018.2818618.

    Article  Google Scholar 

  9. Chang, R. S., & Kuo, C. J. (2006). An vigor efficient routing mechanism for wireless sensorstructure. In Proceedings of the international conference on advanced information networking and applications (AINA), Vienna, Austria (Vol. 2, pp. 308–312).

  10. Zhixiang, D., & Bensheng, Q. (2007). Three-layered routing protocol for WSN based on LEACH algorithm. In Proceedings of the communications conference on wireless, mobile and sensor structure (CCWMSN), Shanghai, China (pp. 72–75).

  11. Hong, J., Kook, J., Lee, S., Kwon, D., & Yi, S. (2009). T-LEACH: The method of threshold-based cluster head replacement for wireless sensor structure. Information Systems Frontiers, 11(5), 513–521.

    Google Scholar 

  12. Liu, T., & Li, F. (2009). Power-efficient clustering routing protocol based on applications in wireless sensor network. In Proceedings of the international conference on wireless communications networking and mobile computing (WiCom), Beijing, China (pp. 1–6).

  13. Kumar, D., Aseri, T. C., & Patel, R. (2009). EEHC: Vigor efficient heterogeneous clustered scheme for wireless sensor structure. Computer Communications, 32(4), 662–667.

    Google Scholar 

  14. Bagherzadeh, J., & Samadzamini, M. (2009). A clustering algorithm for wireless sensor structure based on density of sensors. In Proceedings of the international conference on advances in mobile computing and multimedia (MoMM), Kuala Lumpur, Malaysia (pp. 594–598).

  15. Jia, J. G., He, Z. W., Kuang, J. M., & Mu, Y. H. (2010). An vigor consumption balanced clustering algorithm for wireless sensor network. In Proceedings of the international conferences on wireless communications networking and mobile computing (WiCOM), Chengdu, China (pp. 1–4).

  16. Kang, S. H., & Nguyen, T. (2012). Distance based thresholds for cluster head selection in wireless sensor structure. IEEE Communications Letters, 16(9), 1396–1399.

    Google Scholar 

  17. Wang, A., Yang, D., & Sun, D. (2012). A clustering algorithm based on vigor information and cluster heads expectation for wireless sensor structure. Computers & Electrical Engineering, 38(3), 662–671.

    Google Scholar 

  18. Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013). MODLEACH: A variant of LEACH for WSNs. In Proceedings of the international broadband and wireless computing, communication and applications (BWCCA), Compiegne, France (pp. 158–163).

  19. Tao, Y., Zhang, Y., & Ji, Y. (2013). Flow-balanced routing for multi-hop clustered wireless sensor structure. Ad Hoc Networks, 11(1), 541–554.

    Google Scholar 

  20. Nayak, S. P., Rai, S. C., & Pradhan, S. K. (2015). MERA: A multi-clustered vigor efficient routing algorithm in WSN. In Proceedings of the information technology, Bhubaneswar, India (pp. 37–42).

  21. Sabet, M., & Naji, H. R. (2015). A decentralized vigor efficient hierarchical cluster-basedrouting algorithm for wireless sensor structure. AEU-International Journal of Electronics and Communications, 69(5), 790–799.

    Google Scholar 

  22. Agrawal, T., & Kushwah, R. S. (2015). Layered clustering routing protocol with overlapping cluster heads in WSN. In Proceedings of the communication systems and network technologies (CSNT), Gwalior, India (pp. 244–248).

  23. Sabet, M., & Naji, H. (2016). An vigor efficient multi-level route-aware clustering algorithm for wireless sensor structure: A self-organized approach. Computers & Electrical Engineering, 56, 399–417.

    Google Scholar 

  24. Shahraki, A., Kuchaki Rafsanjani, M., & Borumand Saeid, A. (2017). Hierarchical scatteredmanagement clustering protocol for wireless sensor structure. Telecommunication Systems, 65(1), 193–214.

    Google Scholar 

  25. Cengiz, K., & Dag, T. (2018). Vigor aware multi-hop routing protocol for WSNs. IEEE Access, 6, 2622–2633.

    Google Scholar 

  26. Liu, Y., Qiong, W., Zhao, T., Tie, Y., Bai, F., & Jin, M. (2019). An improved vigor-efficient routing protocol for wireless sensor structure. Sensors, 19(20), 4579. https://doi.org/10.3390/s19204579

    Article  Google Scholar 

  27. Kamran Khan, M., et al. (2018). EE-MRP: Vigor-efficient multistage routing protocol for wireless sensor structure. Wireless Communications and Mobile Computing, 2018, 13.

    Google Scholar 

  28. Patil, S., Vijaya, K., Singha, S., & Jamil, R. (2012). A survey on authentication techniques for wireless sensor structure. International Journal of Applied Engineering Research, 7, 11.

    Google Scholar 

  29. Alrababah, D., Shammari, E. A., & Alsuht, A. (2017). A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks.

  30. Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2015). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Structure. https://doi.org/10.1016/j.adhoc.2015.05.014

    Article  Google Scholar 

  31. Guermazi, A., & Abid, M. (2011). An efficient key distribution scheme to secure statistics-centricrouting protocols in hierarchical wireless sensor structure. Proceedings of Computer Science, 5, 208–215.

    Google Scholar 

  32. Yun, Z., Yuguang, F., & Yanchao, Z. (2008). Securing wireless sensor structure: A survey. IEEE Communication on Surveys Tutorials, 10, 6–28.

    Google Scholar 

  33. Diop, A., Qi, Y., Wang, Q., & Hussain, S. (2013). An advanced survey on secure vigor-efficien thierarchical routing protocols in wireless sensor structure. Intermational Journal of Computer Science, 10, 490–500.

    Google Scholar 

  34. Modirkhazeni, A., Ithnin, N., & Ibrahim, O. (2010). Secure multipath routing protocols in wireless sensor structure: a security survey analysis. In Proceedings of the2nd international conference on network application protocols and services (NETAPPS 2010). Kedah, Malaysia (p. 22833).

  35. Misra, S., & Dias, T. P. (2010). A simple, least-time, and vigor-efficient routing-protocol with one-level statistics aggregation for wireless sensor structure. Journal of System Software, 83, 852–860.

    Google Scholar 

  36. Shi, E., & Perrig, A. (2004). Designing secure sensor structure. IEEE Wireless Communication Magazine, 11, 38–43.

    Google Scholar 

  37. Sahu, S., & Shandilya, S. K. (2010). A comprehensive survey on intrusion detection in WSN. International Journal of Information Technology and Knowledge Management, 2(2), 305–310.

    Google Scholar 

  38. Mamatha, G., & Sharma, S. (2010). A highly secured approach against attacks in WSNS. International Journal of Computer Theory and Engineering, 2(5), 1793–8201.

    Google Scholar 

  39. Burg, A. (2003). Ad hoc structure specific attacks. Technische Universität München, Institut für Informatik, Seminar Paper, Seminar Ad Hoc Networking: concept, applications, and security.

  40. Jawandhiya, P. M., & Ghonge, M. M. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063–4071.

    Google Scholar 

  41. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless ad hoc structure. In Proceedings of 22nd annual joint conference on IEEE computer and communications societies (Infocom’03), San Francisco, CA (Vol. 3, pp. 1976–1986).

  42. Godbole, N. (2010). Information system security. Wiley.

    Google Scholar 

  43. Jangra, A., Goel, N., & Bhati, K. (2010). Security aspects in mobile ad hoc networks (MANETs): A big picture. International Journal of Electronics Engineering, 2(1), 189–196.

    Google Scholar 

  44. Jhaveri, R. H., et.al. (2012). A novel approach for grayhole and blackhole attacks in mobile ad-hoc structure. IEEE.

  45. Panos, C., Xenakis, C., & Stavrakakis, I. (2009). IEEE Fellow—A novel intrusion detection system for WSNs.

  46. Jhaveri, R. H., et al. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based WSNs. IEEE.

  47. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P., & Tiny P. K. (2004). Securing sensor structure with public key technology. In: Proceedings of ACM workshop security of ad hoc sensor structure (pp. 59–64).

  48. Watro, R. (2006). A dynamic user authentication scheme for wireless sensor structure, ser. In Proceedings of the IEEE international conference on sensor structure, ubiquitous, and trustworthy computing (Vol. 1). IEEE Computer Society.

  49. Panos, C., Xenakis, C., & Stavrakakis, I. (2009). A novel intrusion detection system for WSNs international conference on security and cryptography (SECRYPT).

  50. “Intrusion Detection System” http://www.intrusiondetection-system-group.co.uk/, Link visited on December 2010.

  51. Rajavaram, S., Shah, H., Shanbhag, V., Undercoffer, J., & Joshi, A. (2002). Neighborhood watch: An intrusion detection and response protocol for mobile ad hoc structure. In Student research conference. University of Maryland at Baltiadditional County (UMBC).

  52. Sharma, N., & Sharma, A. (2012). The black-hole node attack in MANET. In 2012 second international conference on advanced computing & communication technologies (pp. 546–550). IEEE.

  53. Agrawal, S., Jain, S., & Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc structure. Journal of Computing, 3(1). https://sites.google.com/site/journalofcomputing/www.journalofcomputing.org

  54. Kumari, S., Khan, M. K., & Atiquzzaman, M. (2014). User authentication schemes for wireless sensor structure: A review. Ad Hoc Structure. https://doi.org/10.1016/j.adhoc.2014.11.018

    Article  Google Scholar 

  55. Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159–194.

    Google Scholar 

  56. Bouam, S., & Othman, J. B. (2003). Statistics security in ad hoc structure using multipath routing. In Proceedings of the 14th IEEE PIMRC (pp. 1331–1335).

  57. Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor structure. In Proceedings of IEEE Globecom, Washington, DC, USA (pp. 986–990).

  58. Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two-factor user authentication in wireless sensor structure. In IEEE 6th international conference on wireless and mobile computing, networking and communications (pp. 600–606). IEEE.

  59. Ko, L. C. (2008). A novel dynamic user authentication scheme for wireless sensor structure. In IEEE international symposium on wireless communication systems (ISWCS '08) (pp. 608–612).

  60. Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor structure. In The second international conference on sensor technologies and applications (pp. 657–660).

  61. Das, M. L. (2009). Two-factor user authentication in wireless sensor structure. IEEE Transactions in Wireless Communication, 8(3), 1086–1090.

    Google Scholar 

  62. Jamil, N., Sameon, S. S., & Mahmood, R. (2010). A user authentication scheme based on identity-bits commitment for wireless sensor structure. In Second international conference on network applications, protocols and services (pp. 61–66).

  63. Qiu, Y., Zhou, J., Back, J., & Lopez, J. (2010). Authentication and key establishment in dynamic WBAN. Sensors. https://doi.org/10.3390/s100403718

    Article  Google Scholar 

  64. Huang, H. F., Chang, Y. F., & Liu, C. H. (2010). Enhancement of two-factor user authentication in wireless sensor structure. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10) (pp. 27–30).

  65. Chen, T. H., & Shih, W. K. (2010). A robust mutual authentication protocol for wireless sensor structure. ETRI Journal, 32(5), 704–712.

    Google Scholar 

  66. Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor structure.” Sensors, 10(3), 2450–2459.

    Google Scholar 

  67. Butun, I., & Shankar, R. (2011). Advanced two tier using authentication scheme for heterogeneous WSN. In 2nd IEEE CCNC research student workshop.

  68. Kumar, D., Aseri, T. C., & Patel, R. B. (2011). Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor structure. International Journal of Information Technology, Communications and Convergence, 1(2), 130–145.

    Google Scholar 

  69. He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor structure. Ad Hoc & Sensor Wireless Structure, 0, 1–11.

    Google Scholar 

  70. Yoo, S. G., Park, K. Y., & Kim, J. (2012). A security-performance-balanced user authentication scheme for wireless sensor structure. International Journal of Scattered Sensor Structure, 2012, 1–11.

    Google Scholar 

  71. Tan, Z. (2011). Cryptanalyses of a two-factor user authentication scheme in wireless sensor structure. Advances in Information Sciences and Service Sciences, 3(4), 117–126.

    Google Scholar 

  72. Xue, K., Ma, C., Hong, P., & Ding, R. (2012). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor structure. Journal of Structure and Computer Applications, 36, 316–323.

    Google Scholar 

  73. Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor structure. Elektronika IR Elektrotechnika, 19, 109–116.

    Google Scholar 

  74. Turkanovic, M., Brumen, B., & Holbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor structure based on the internet of things notion. Ad Hoc Structure, 20, 96–112.

    Google Scholar 

  75. Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor structure. Ad Hoc Structure, 36(1), 58–80.

    Google Scholar 

  76. Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks, 36, 152–176.

    Google Scholar 

  77. Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor structure. Sensors, 13, 9589–9603.

    Google Scholar 

  78. Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor structure. Computer Structure, 101, 42–62.

    Google Scholar 

  79. Amin, R., Islam, S. H., Biswas, G. P., & Obaidat, M. S. (2018). A Ro-bust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Structure. https://doi.org/10.1016/j.adhoc.2018.03.007

    Article  Google Scholar 

  80. Vaidya, B., Silva, J. S., & Rodrigues, J. J. (2009). Robust dynamic user authentication scheme for wireless sensor structure. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks (pp. 88–91).

  81. Chatterjee, K., De, A., & Gupta, D. (2015). A secure and efficient authentication protocol in wireless sensor network. Wireless Personnal Communication, 81, 17–37.

    Google Scholar 

  82. Almutairi, A. F., Yousef, A. B., & Mishal, A. G. (2019). Improving the performance of wireless network in residential areas in Kuwait. Journal of Engineering Research, 7(4), 215–224.

    Google Scholar 

  83. Devika, G., Ramesh, D., & Asha, G. K. (2020). A study on energy-efficient wireless sensor network protocols. IGI Global. https://doi.org/10.4018/978-1-7998-1626-3.ch007

    Article  Google Scholar 

  84. Singh, S., Kumar, S., Nayyar, A., Al-Turjman, F., & Mostarda, L. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315–74325.

    Google Scholar 

  85. Merabtine, N., Djenouri, D., & Zegour, D.-E. (2021). Towards energy efficient clustering in wireless sensor networks: A comprehensive review. IEEE Access, 9, 92688–92705. https://doi.org/10.1109/ACCESS.2021.3092509

    Article  Google Scholar 

  86. Yadav, R. K., & Mishra, R. (2021). Analysis of DEEC deviations in heterogeneous WSNs: A survey. In V. Bhateja, S. C. Satapathy, C. M. Travieso-Gonzalez, & W. Flores-Fuentes (Eds.), Computer communication, networking and IoT. Lecture notes in networks and systems. (Vol. 197). Singapore: Springer. https://doi.org/10.1007/978-981-16-0980-0_22

    Chapter  Google Scholar 

Download references

Funding

“Not applicable”.

Author information

Authors and Affiliations

Authors

Contributions

RKY and RM contributed to collecting related literature and discussing advantages and disadvantages.

Corresponding author

Correspondence to Rashmi Mishra.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

Consent for publication

“Not applicable”.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, R.K., Mishra, R. Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and Methods. Wireless Pers Commun 123, 2777–2833 (2022). https://doi.org/10.1007/s11277-021-09265-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09265-7

Keywords

Navigation