{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:48:54Z","timestamp":1761976134176,"version":"build-2065373602"},"reference-count":69,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002403","name":"Taibah University","doi-asserted-by":"publisher","award":["434\/4301"],"award-info":[{"award-number":["434\/4301"]}],"id":[{"id":"10.13039\/501100002403","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,5,1]]},"abstract":"<jats:p> Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding, wormhole, Hello flood, and replication attacks. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against these attacks while efficiently utilizing the energy of the deployed nodes has become imperative. Several routing protocols have been proposed in the literature for WSNs. Most of these protocols assume static nodes and sinks to collect data from network fields. However, they may be highly movable, and recent advances show that mobile sensors in WSNs have a promising performance. Therefore, this paper surveys the state of the art on routing protocols related to WSNs and presents the security issues or problems associated with the current protocols as well as discusses the future trends and open research issues on secure routing protocols of WSNs. <\/jats:p>","DOI":"10.1155\/2013\/802526","type":"journal-article","created":{"date-parts":[[2013,5,24]],"date-time":"2013-05-24T21:00:15Z","timestamp":1369429215000},"page":"802526","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":11,"title":["New Trends in Secure Routing Protocols for Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Aly Mohamed","family":"El-Semary","sequence":"first","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Al-Madina Al-Munawwarah, Saudi Arabia"},{"name":"Faculty of Engineering, Al-Azhar University, Cairo, Egypt"}]},{"given":"Mohamed Mostafa","family":"Abdel-Azim","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Al-Madina Al-Munawwarah, Saudi Arabia"},{"name":"Faculty of Industrial Education, Beni-Suef University, Beni-Suef, Egypt"}]}],"member":"179","published-online":{"date-parts":[[2013,5,24]]},"reference":[{"first-page":"78","volume-title":"Proceedings of the 4th Workshop on Embedded Networked Sensors (EmNets \u203207)","author":"Mulligan G.","key":"B3-2013-802526"},{"key":"B4-2013-802526","doi-asserted-by":"publisher","DOI":"10.1002\/9780470443521"},{"volume-title":"Wireless Sensor Networks for Healthcare Applications","year":"2009","author":"Dishongh T. J.","key":"B5-2013-802526"},{"key":"B6-2013-802526","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-49592-7"},{"first-page":"748","volume-title":"Proceedings of the 1st International Conference on Broadband Networks (Broadnets \u201904)","author":"Bai H.","key":"B7-2013-802526"},{"first-page":"88","volume-title":"Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications","author":"Mainwaring A.","key":"B8-2013-802526"},{"key":"B9-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"first-page":"483","volume-title":"Proceedings of IEEE International Conference on Information Acquisition","author":"Hongliang R.","key":"B10-2013-802526"},{"key":"B11-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2006.21"},{"key":"B12-2013-802526","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2003.09.010"},{"issue":"2","key":"B13-2013-802526","first-page":"570","volume":"2","author":"Singh S. K.","year":"2010","journal-title":"International Journal of Advanced Networking and Applications"},{"issue":"4","key":"B14-2013-802526","first-page":"517","volume":"60","author":"Padmanabhan K.","year":"2011","journal-title":"European Journal of Scientific Research"},{"key":"B15-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00084"},{"key":"B16-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00058"},{"issue":"1","key":"B17-2013-802526","first-page":"41","volume":"4","author":"Popescu A. M.","year":"2012","journal-title":"International Journal of Communication Networks and Information Security"},{"issue":"2","key":"B18-2013-802526","first-page":"170","volume":"3","author":"Trivi\u00f1o-Cabrera A.","year":"2011","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"B19-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"first-page":"174","volume-title":"Proceedings of the 5th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom \u203299)","author":"Heinzelman W.","key":"B20-2013-802526"},{"key":"B21-2013-802526","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"volume-title":"Proceedings of the first Workshop on Sensor Networks and Applications (WSNA \u203202)","author":"Braginsky D.","key":"B22-2013-802526"},{"first-page":"3005","volume-title":"Proceedings of IEEE Hawaii International Conference on System Sciences","author":"Heizelman W. R.","key":"B23-2013-802526"},{"first-page":"2009","volume-title":"Proceedings 15th International in Parallel and Distributed Processing Symposium","author":"Manjeshwar A.","key":"B24-2013-802526"},{"key":"B25-2013-802526","first-page":"1125","volume-title":"Proceedings of IEEE Aerospace Conference","volume":"3","author":"Lindsey S."},{"key":"B26-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/98.878533"},{"key":"B28-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2007.4429241"},{"key":"B29-2013-802526","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2010.6.3.295"},{"key":"B30-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2010.5657734"},{"key":"B31-2013-802526","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"key":"B32-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00058"},{"key":"B33-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.36"},{"key":"B34-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.41"},{"key":"B35-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2012.2205674"},{"key":"B36-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2205284"},{"key":"B37-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/NETAPPS.2010.48"},{"issue":"1","key":"B38-2013-802526","first-page":"0975","volume":"53","author":"Halim T.","year":"2012","journal-title":"International Journal of Computer Application"},{"issue":"3","key":"B39-2013-802526","first-page":"4","volume":"2","author":"Khan S.","year":"2008","journal-title":"International Journal of Digital Content Technology and Its Application"},{"key":"B40-2013-802526","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.005"},{"volume-title":"Algorithms and Protocols for Wireless Sensor Networks","year":"2009","author":"Zia T.","key":"B41-2013-802526"},{"key":"B42-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2009.4801782"},{"first-page":"25","volume-title":"Proceedings of the International Symposium on Instrumentation and Measurement, Sensor Networks, and Automation (IMSNA \u203212)","author":"Gupta C.","key":"B43-2013-802526"},{"key":"B44-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"B45-2013-802526","first-page":"1","volume":"1","author":"Khan W. Z.","year":"2011","journal-title":"International Journal on Computer Network and Information Security"},{"key":"B46-2013-802526","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"volume-title":"Proceedings of the1st International Workshop on Peer-to-Peer Systems (IPTPS \u203202)","author":"Douceur J. R.","key":"B47-2013-802526"},{"key":"B48-2013-802526","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"B49-2013-802526","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72606-7_22"},{"key":"B50-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2010.5679906"},{"first-page":"312","volume-title":"Proceedings of IEEE 3rd International Conference on Computational Intelligence, Modelling and Simulation","author":"Gawdan I. S.","key":"B51-2013-802526"},{"key":"B52-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.138"},{"first-page":"189","volume-title":"Proceedings of 7th annual International Conference on Mobile Computing and Networking (MobiCom\u201901)","author":"Perrig A.","key":"B53-2013-802526"},{"key":"B54-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2006.257149"},{"key":"B55-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/ICINFA.2008.4608249"},{"key":"B56-2013-802526","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.06.003"},{"key":"B57-2013-802526","doi-asserted-by":"publisher","DOI":"10.4303\/ijsndc\/X110201"},{"key":"B58-2013-802526","first-page":"324","volume":"7","author":"Aly El-Semary M.","year":"2012","journal-title":"Journal of Information Assurance and Security"},{"key":"B59-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.185"},{"key":"B60-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2007.4414440"},{"key":"B61-2013-802526","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.5.535-542"},{"key":"B62-2013-802526","doi-asserted-by":"publisher","DOI":"10.1002\/047174414X.ch5"},{"issue":"1","key":"B63-2013-802526","first-page":"68","volume":"4","author":"Kesavan V. T.","year":"2012","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"B64-2013-802526","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-009-9143-3"},{"key":"B65-2013-802526","first-page":"170","volume":"4","author":"Khan S.","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"B66-2013-802526","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-010-0048-y"},{"key":"B67-2013-802526","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0017-x"},{"key":"B68-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.207"},{"key":"B69-2013-802526","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536269"},{"volume-title":"Proceedings of IEEE-International Conference on Recent Trends in Information Technology (ICRTIT \u203211)","author":"Suganthi K.","key":"B70-2013-802526"},{"key":"B71-2013-802526","doi-asserted-by":"publisher","DOI":"10.5120\/8386-1992"},{"volume-title":"Proceedings of IEEE-International Conference on Recent Trends in Information Technology (ICRTIT \u203211)","author":"Srinivasan S. P.","key":"B72-2013-802526"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/802526","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/802526","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/802526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T22:28:22Z","timestamp":1621204102000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/802526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":69,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,5,1]]}},"alternative-id":["10.1155\/2013\/802526"],"URL":"https:\/\/doi.org\/10.1155\/2013\/802526","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}