Abstract
Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some limitations. But in today's world, we are searching for the approach which provides cost-effective and time-saving that divulges the new idea and tactic in the envisioned arena. The study delivers the rapid opinion of this perception. In many areas, WSN is used such as in weather forecasting, military applications, battlefield applications, intrusion detection system. But these systems are having many limitations such as energy inefficiency, security, synchronization. For ensuring energy efficiency low-energy adaptive clustering hierarchy (LEACH) and advanced version of LEACH are used to augment the area of the sensor knobs. Author mentions and analyses the different types of protocols for prolonging the energy of sensor knobs. The research claimed had absorbed the security of the sensor knobs by implementing the different types of authentication measures which reduce attacks, capture attack, pin guessing attacks, and many more. This survey is very useful for beginners to understand the limitations and shortcomings of the cluster head and authentication protocols in WSN.
Similar content being viewed by others
References
Azim, A., & Islam, M. M. (2009). A dynamic round-time based fixed low vigor adaptive clustering hierarchy for wireless sensor structure. In IEEE 9th Malaysia international conference, Malaysia (MICC) (pp. 922–926).
Stallings, W., & Brown, L. (2011). Computer security: Principles and practice (2nd ed.). Stallings.
Internet of Things: Wireless Sensor Network. (2014). International Electrotechnical Commission IEC, White Paper, 2014-11-01.
Pawani, P., Pranaw, K., Andrei, G., & Mika, Y. (2014). Two-phase authentication protocol for wireless sensor structure in scattered IoT applications, Istanbul, 6 April 2014. In Wireless communications and networking conference (WCNC), 2014 IEEE (pp. 2728–2733). IEEE.
Fanian, F., & Rafsanjani, M. K. (2019). Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. Journal of Network and Computer Applications, 142, 111–142.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor structure. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Tarhani, M., Kavian, Y. S., & Siavoshi, S. (2014). SEECH: Scalable vigor efficient clustering hierarchy protocol in wireless sensor structure. IEEE Sensors Journal, 14, 3944–3954. https://doi.org/10.1109/JSEN.2014.2358567
Tanwar, S., Tyagi, S., Kumar, N., & Obaidat, M. S. (2019). LA-MHR: Learning automata based multilevel heterogeneous routing for opportunistic shared spectrum access to enhance lifetime of WSN. IEEE Systems Journal, 13, 313–323. https://doi.org/10.1109/JSYST.2018.2818618.
Chang, R. S., & Kuo, C. J. (2006). An vigor efficient routing mechanism for wireless sensorstructure. In Proceedings of the international conference on advanced information networking and applications (AINA), Vienna, Austria (Vol. 2, pp. 308–312).
Zhixiang, D., & Bensheng, Q. (2007). Three-layered routing protocol for WSN based on LEACH algorithm. In Proceedings of the communications conference on wireless, mobile and sensor structure (CCWMSN), Shanghai, China (pp. 72–75).
Hong, J., Kook, J., Lee, S., Kwon, D., & Yi, S. (2009). T-LEACH: The method of threshold-based cluster head replacement for wireless sensor structure. Information Systems Frontiers, 11(5), 513–521.
Liu, T., & Li, F. (2009). Power-efficient clustering routing protocol based on applications in wireless sensor network. In Proceedings of the international conference on wireless communications networking and mobile computing (WiCom), Beijing, China (pp. 1–6).
Kumar, D., Aseri, T. C., & Patel, R. (2009). EEHC: Vigor efficient heterogeneous clustered scheme for wireless sensor structure. Computer Communications, 32(4), 662–667.
Bagherzadeh, J., & Samadzamini, M. (2009). A clustering algorithm for wireless sensor structure based on density of sensors. In Proceedings of the international conference on advances in mobile computing and multimedia (MoMM), Kuala Lumpur, Malaysia (pp. 594–598).
Jia, J. G., He, Z. W., Kuang, J. M., & Mu, Y. H. (2010). An vigor consumption balanced clustering algorithm for wireless sensor network. In Proceedings of the international conferences on wireless communications networking and mobile computing (WiCOM), Chengdu, China (pp. 1–4).
Kang, S. H., & Nguyen, T. (2012). Distance based thresholds for cluster head selection in wireless sensor structure. IEEE Communications Letters, 16(9), 1396–1399.
Wang, A., Yang, D., & Sun, D. (2012). A clustering algorithm based on vigor information and cluster heads expectation for wireless sensor structure. Computers & Electrical Engineering, 38(3), 662–671.
Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013). MODLEACH: A variant of LEACH for WSNs. In Proceedings of the international broadband and wireless computing, communication and applications (BWCCA), Compiegne, France (pp. 158–163).
Tao, Y., Zhang, Y., & Ji, Y. (2013). Flow-balanced routing for multi-hop clustered wireless sensor structure. Ad Hoc Networks, 11(1), 541–554.
Nayak, S. P., Rai, S. C., & Pradhan, S. K. (2015). MERA: A multi-clustered vigor efficient routing algorithm in WSN. In Proceedings of the information technology, Bhubaneswar, India (pp. 37–42).
Sabet, M., & Naji, H. R. (2015). A decentralized vigor efficient hierarchical cluster-basedrouting algorithm for wireless sensor structure. AEU-International Journal of Electronics and Communications, 69(5), 790–799.
Agrawal, T., & Kushwah, R. S. (2015). Layered clustering routing protocol with overlapping cluster heads in WSN. In Proceedings of the communication systems and network technologies (CSNT), Gwalior, India (pp. 244–248).
Sabet, M., & Naji, H. (2016). An vigor efficient multi-level route-aware clustering algorithm for wireless sensor structure: A self-organized approach. Computers & Electrical Engineering, 56, 399–417.
Shahraki, A., Kuchaki Rafsanjani, M., & Borumand Saeid, A. (2017). Hierarchical scatteredmanagement clustering protocol for wireless sensor structure. Telecommunication Systems, 65(1), 193–214.
Cengiz, K., & Dag, T. (2018). Vigor aware multi-hop routing protocol for WSNs. IEEE Access, 6, 2622–2633.
Liu, Y., Qiong, W., Zhao, T., Tie, Y., Bai, F., & Jin, M. (2019). An improved vigor-efficient routing protocol for wireless sensor structure. Sensors, 19(20), 4579. https://doi.org/10.3390/s19204579
Kamran Khan, M., et al. (2018). EE-MRP: Vigor-efficient multistage routing protocol for wireless sensor structure. Wireless Communications and Mobile Computing, 2018, 13.
Patil, S., Vijaya, K., Singha, S., & Jamil, R. (2012). A survey on authentication techniques for wireless sensor structure. International Journal of Applied Engineering Research, 7, 11.
Alrababah, D., Shammari, E. A., & Alsuht, A. (2017). A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks.
Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2015). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Structure. https://doi.org/10.1016/j.adhoc.2015.05.014
Guermazi, A., & Abid, M. (2011). An efficient key distribution scheme to secure statistics-centricrouting protocols in hierarchical wireless sensor structure. Proceedings of Computer Science, 5, 208–215.
Yun, Z., Yuguang, F., & Yanchao, Z. (2008). Securing wireless sensor structure: A survey. IEEE Communication on Surveys Tutorials, 10, 6–28.
Diop, A., Qi, Y., Wang, Q., & Hussain, S. (2013). An advanced survey on secure vigor-efficien thierarchical routing protocols in wireless sensor structure. Intermational Journal of Computer Science, 10, 490–500.
Modirkhazeni, A., Ithnin, N., & Ibrahim, O. (2010). Secure multipath routing protocols in wireless sensor structure: a security survey analysis. In Proceedings of the2nd international conference on network application protocols and services (NETAPPS 2010). Kedah, Malaysia (p. 22833).
Misra, S., & Dias, T. P. (2010). A simple, least-time, and vigor-efficient routing-protocol with one-level statistics aggregation for wireless sensor structure. Journal of System Software, 83, 852–860.
Shi, E., & Perrig, A. (2004). Designing secure sensor structure. IEEE Wireless Communication Magazine, 11, 38–43.
Sahu, S., & Shandilya, S. K. (2010). A comprehensive survey on intrusion detection in WSN. International Journal of Information Technology and Knowledge Management, 2(2), 305–310.
Mamatha, G., & Sharma, S. (2010). A highly secured approach against attacks in WSNS. International Journal of Computer Theory and Engineering, 2(5), 1793–8201.
Burg, A. (2003). Ad hoc structure specific attacks. Technische Universität München, Institut für Informatik, Seminar Paper, Seminar Ad Hoc Networking: concept, applications, and security.
Jawandhiya, P. M., & Ghonge, M. M. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063–4071.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless ad hoc structure. In Proceedings of 22nd annual joint conference on IEEE computer and communications societies (Infocom’03), San Francisco, CA (Vol. 3, pp. 1976–1986).
Godbole, N. (2010). Information system security. Wiley.
Jangra, A., Goel, N., & Bhati, K. (2010). Security aspects in mobile ad hoc networks (MANETs): A big picture. International Journal of Electronics Engineering, 2(1), 189–196.
Jhaveri, R. H., et.al. (2012). A novel approach for grayhole and blackhole attacks in mobile ad-hoc structure. IEEE.
Panos, C., Xenakis, C., & Stavrakakis, I. (2009). IEEE Fellow—A novel intrusion detection system for WSNs.
Jhaveri, R. H., et al. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based WSNs. IEEE.
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P., & Tiny P. K. (2004). Securing sensor structure with public key technology. In: Proceedings of ACM workshop security of ad hoc sensor structure (pp. 59–64).
Watro, R. (2006). A dynamic user authentication scheme for wireless sensor structure, ser. In Proceedings of the IEEE international conference on sensor structure, ubiquitous, and trustworthy computing (Vol. 1). IEEE Computer Society.
Panos, C., Xenakis, C., & Stavrakakis, I. (2009). A novel intrusion detection system for WSNs international conference on security and cryptography (SECRYPT).
“Intrusion Detection System” http://www.intrusiondetection-system-group.co.uk/, Link visited on December 2010.
Rajavaram, S., Shah, H., Shanbhag, V., Undercoffer, J., & Joshi, A. (2002). Neighborhood watch: An intrusion detection and response protocol for mobile ad hoc structure. In Student research conference. University of Maryland at Baltiadditional County (UMBC).
Sharma, N., & Sharma, A. (2012). The black-hole node attack in MANET. In 2012 second international conference on advanced computing & communication technologies (pp. 546–550). IEEE.
Agrawal, S., Jain, S., & Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc structure. Journal of Computing, 3(1). https://sites.google.com/site/journalofcomputing/www.journalofcomputing.org
Kumari, S., Khan, M. K., & Atiquzzaman, M. (2014). User authentication schemes for wireless sensor structure: A review. Ad Hoc Structure. https://doi.org/10.1016/j.adhoc.2014.11.018
Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159–194.
Bouam, S., & Othman, J. B. (2003). Statistics security in ad hoc structure using multipath routing. In Proceedings of the 14th IEEE PIMRC (pp. 1331–1335).
Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor structure. In Proceedings of IEEE Globecom, Washington, DC, USA (pp. 986–990).
Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two-factor user authentication in wireless sensor structure. In IEEE 6th international conference on wireless and mobile computing, networking and communications (pp. 600–606). IEEE.
Ko, L. C. (2008). A novel dynamic user authentication scheme for wireless sensor structure. In IEEE international symposium on wireless communication systems (ISWCS '08) (pp. 608–612).
Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor structure. In The second international conference on sensor technologies and applications (pp. 657–660).
Das, M. L. (2009). Two-factor user authentication in wireless sensor structure. IEEE Transactions in Wireless Communication, 8(3), 1086–1090.
Jamil, N., Sameon, S. S., & Mahmood, R. (2010). A user authentication scheme based on identity-bits commitment for wireless sensor structure. In Second international conference on network applications, protocols and services (pp. 61–66).
Qiu, Y., Zhou, J., Back, J., & Lopez, J. (2010). Authentication and key establishment in dynamic WBAN. Sensors. https://doi.org/10.3390/s100403718
Huang, H. F., Chang, Y. F., & Liu, C. H. (2010). Enhancement of two-factor user authentication in wireless sensor structure. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10) (pp. 27–30).
Chen, T. H., & Shih, W. K. (2010). A robust mutual authentication protocol for wireless sensor structure. ETRI Journal, 32(5), 704–712.
Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor structure.” Sensors, 10(3), 2450–2459.
Butun, I., & Shankar, R. (2011). Advanced two tier using authentication scheme for heterogeneous WSN. In 2nd IEEE CCNC research student workshop.
Kumar, D., Aseri, T. C., & Patel, R. B. (2011). Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor structure. International Journal of Information Technology, Communications and Convergence, 1(2), 130–145.
He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor structure. Ad Hoc & Sensor Wireless Structure, 0, 1–11.
Yoo, S. G., Park, K. Y., & Kim, J. (2012). A security-performance-balanced user authentication scheme for wireless sensor structure. International Journal of Scattered Sensor Structure, 2012, 1–11.
Tan, Z. (2011). Cryptanalyses of a two-factor user authentication scheme in wireless sensor structure. Advances in Information Sciences and Service Sciences, 3(4), 117–126.
Xue, K., Ma, C., Hong, P., & Ding, R. (2012). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor structure. Journal of Structure and Computer Applications, 36, 316–323.
Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor structure. Elektronika IR Elektrotechnika, 19, 109–116.
Turkanovic, M., Brumen, B., & Holbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor structure based on the internet of things notion. Ad Hoc Structure, 20, 96–112.
Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor structure. Ad Hoc Structure, 36(1), 58–80.
Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks, 36, 152–176.
Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor structure. Sensors, 13, 9589–9603.
Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor structure. Computer Structure, 101, 42–62.
Amin, R., Islam, S. H., Biswas, G. P., & Obaidat, M. S. (2018). A Ro-bust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Structure. https://doi.org/10.1016/j.adhoc.2018.03.007
Vaidya, B., Silva, J. S., & Rodrigues, J. J. (2009). Robust dynamic user authentication scheme for wireless sensor structure. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks (pp. 88–91).
Chatterjee, K., De, A., & Gupta, D. (2015). A secure and efficient authentication protocol in wireless sensor network. Wireless Personnal Communication, 81, 17–37.
Almutairi, A. F., Yousef, A. B., & Mishal, A. G. (2019). Improving the performance of wireless network in residential areas in Kuwait. Journal of Engineering Research, 7(4), 215–224.
Devika, G., Ramesh, D., & Asha, G. K. (2020). A study on energy-efficient wireless sensor network protocols. IGI Global. https://doi.org/10.4018/978-1-7998-1626-3.ch007
Singh, S., Kumar, S., Nayyar, A., Al-Turjman, F., & Mostarda, L. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315–74325.
Merabtine, N., Djenouri, D., & Zegour, D.-E. (2021). Towards energy efficient clustering in wireless sensor networks: A comprehensive review. IEEE Access, 9, 92688–92705. https://doi.org/10.1109/ACCESS.2021.3092509
Yadav, R. K., & Mishra, R. (2021). Analysis of DEEC deviations in heterogeneous WSNs: A survey. In V. Bhateja, S. C. Satapathy, C. M. Travieso-Gonzalez, & W. Flores-Fuentes (Eds.), Computer communication, networking and IoT. Lecture notes in networks and systems. (Vol. 197). Singapore: Springer. https://doi.org/10.1007/978-981-16-0980-0_22
Funding
“Not applicable”.
Author information
Authors and Affiliations
Contributions
RKY and RM contributed to collecting related literature and discussing advantages and disadvantages.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interests regarding the publication of this paper.
Consent for publication
“Not applicable”.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yadav, R.K., Mishra, R. Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and Methods. Wireless Pers Commun 123, 2777–2833 (2022). https://doi.org/10.1007/s11277-021-09265-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09265-7