You can view the full text of this article for free using the link below.

Title: Survey: secure opportunistic routing protocols in wireless networks

Authors: Hanane Saidi; Driss Gretete; Addaim Adnane

Addresses: Département d'Informatique, Logistique et Mathématiques (ILM), B.P. 241, Campus universitaire, 14000, Kenitra, Morocco ' Département d'Informatique, Logistique et Mathématiques (ILM), B.P. 241, Campus universitaire, 14000, Kenitra, Morocco ' Département d'Informatique, Logistique et Mathématiques (ILM), B.P. 241, Campus universitaire, 14000, Kenitra, Morocco

Abstract: Opportunistic routing (OR) protocols in wireless network schemes are a rich research field. These protocols select the best path in order to send information and take the broadcasting medium into consideration. OR tends to reach better reliability and performance than traditional routing (TR). However, they are both equally vulnerable to the same attacks because wireless networks might be deployed in hostile or unwatched environments. The approaches in terms of routing are mainly focusing on energy preservation, robustness, etc. However few work has been done to secure routing protocols especially in OR. In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols.

Keywords: wireless networks; security; opportunistic routing.

DOI: 10.1504/IJIPSI.2019.10025219

International Journal of Information Privacy, Security and Integrity, 2019 Vol.4 No.1, pp.30 - 48

Received: 04 Jul 2018
Accepted: 03 Feb 2019

Published online: 08 Nov 2019 *

Full-text access for editors Access for subscribers Free access Comment on this article