Title: Survey: secure opportunistic routing protocols in wireless networks
Authors: Hanane Saidi; Driss Gretete; Addaim Adnane
Addresses: Département d'Informatique, Logistique et Mathématiques (ILM), B.P. 241, Campus universitaire, 14000, Kenitra, Morocco ' Département d'Informatique, Logistique et Mathématiques (ILM), B.P. 241, Campus universitaire, 14000, Kenitra, Morocco ' Département d'Informatique, Logistique et Mathématiques (ILM), B.P. 241, Campus universitaire, 14000, Kenitra, Morocco
Abstract: Opportunistic routing (OR) protocols in wireless network schemes are a rich research field. These protocols select the best path in order to send information and take the broadcasting medium into consideration. OR tends to reach better reliability and performance than traditional routing (TR). However, they are both equally vulnerable to the same attacks because wireless networks might be deployed in hostile or unwatched environments. The approaches in terms of routing are mainly focusing on energy preservation, robustness, etc. However few work has been done to secure routing protocols especially in OR. In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols.
Keywords: wireless networks; security; opportunistic routing.
DOI: 10.1504/IJIPSI.2019.103550
International Journal of Information Privacy, Security and Integrity, 2019 Vol.4 No.1, pp.30 - 48
Received: 04 Jul 2018
Accepted: 03 Feb 2019
Published online: 11 Nov 2019 *