Cryptography Reference
In-Depth Information
Chapter 7
Routing in Wireless Sensor
Networks Using Identity-
Based Cryptography
In This Chapter
• Introduction to routing in WSN
• Routingclassification
• Selective-forwardingattack
• ID-based routing in WSN
• Cross-layerapproach
7.1 Introduction
Routing is one of the most fundamental operations in any network that attempts to
ensure the delivery of messages from a source to a selected destination. It is a two-step
method that involves the process of discovering a suitable route between the concerned
source and its destination, and the forwarding of messages using this discovered route.
In traditional networks (IP or 3G networks), routing operations are dedicated to special
nodes, such as routers. However, WSN consist of resource-constraint devices operating
in an ad-hoc decentralized manner that require all the network operations to be done by
these ordinary sensor nodes. Some real-time applications (remote-sensing operations)
require the routing protocols to facilitate the timely delivery of messages. However,
such applications are too resource intensive in WSN and require routing protocols that
135
 
Search WWH ::




Custom Search