International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.5, No.6, May. 2013

Secured and Optimized AODV for Wireless Sensor Networks

Full Text (PDF, 342KB), PP.23-31

Views:76   Downloads:1


Benamar KADRI, Mohammed FEHAM, AbdellahMHAMMED

Index Terms

Security, Routing, WSNs, AODV, OAODV, SAODV


Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is hostile and unpredictable making the routing protocols developed for conventional wireless network useless for WSNs without modifications and adaptations for the new context of WSNs. Thus in this paper we present an optimized version of AODV protocol for WSNs which takes into consideration the traffic pattern of WSNs and sensors’ constraints. In the proposed protocol we affect the task of route discovery to the base station which periodically informs sensors about its location instead of letting this task to sensors which consumes the network resources due to the broadcasting nature of the route discovery. We have also proposed a key distribution scheme destined to establish a symmetric encrypting key between each sensor and the base station, the proposed key management scheme uses the underlying routing requests to execute handshakes and key update which have greatly saved the network resources and ensured a good threshold of security.

Cite This Paper

Benamar KADRI, Mohammed FEHAM, AbdellahMHAMMED,"Secured and Optimized AODV for Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), vol.5, no.6, pp.23-31, 2013. DOI: 10.5815/ijitcs.2013.06.04


[1]Hande Alemdar, Cem Ersoy, “Wireless sensor networks for healthcare: A survey”, Computer Networks, Vol 54, No 15, pp. 2688-2710, 2010.

[2]I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: a survey”, Computer Networks, Vol. 38, No. 4, pp. 393–422, 2002. 

[3]C. Perkins et al., “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft draftietfmanet-aodv-11.txt, June 2002.

[4]Jamal Al-Karaki, and Ahmed E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Communications Magazine, vol 11, no. 6, pp. 6-28, 2004.

[5]T. Clausen, and P. Jacquet. “Optimized Link State Routing Protocol (OLSR)”. RFC 3626, October 2003,

[6]C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector (DSDV) for Mobile Computers”, Proc. ACM Conf. Architectures and Protocols (SIGCOMM’ 94), London, UK, pp. 234–44, 1994.

[7]D. B. Johnson and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)”, IETF Internet draft, 19 July 2004,

[8]S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA), Vol. 02, No 02, pp. 570–580, 2010.

[9]Akkaya, K.; Younis, M. “A Survey on Routing Protocols for Wireless Sensor Networks”. Ad Hoc Network, Vol 3, No 3, PP 325–349, 2005.

[10]Ming Liu, Jiannong Cao, Guihai Chen, and Xiaomin Wang, “An Energy-Aware Routing Protocol in Wireless Sensor Networks”, Sensors, vol. 9, No. 1 pp. 445-462, 2009.

[11]K. Akkaya and M. Younis, “An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks,” in the Proceedings of the IEEE Workshop on Mobile and Wireless Networks (MWN 2003), Providence, Rhode Island, May 2003.

[12]Karlof, C. & Wagner, D. “Secure routing in wireless sensor networks: attacks and countermeasures”. Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, 2003.

[13]Tilak, S.; Abu-Ghazaleh, N.B.; Heinzelman, W. “A Taxonomy of Wireless Micro-Sensor Network Models”. Mobile Computing Communication Review, Vol 6, No. 2, pp. 28–36. 2002

[14]Gungor, V.C.; Bin Lu; Hancke, G.P.; “Opportunities and Challenges of Wireless Sensor Networks in Smart Grid“, Industrial Electronics, IEEE Transactions, Vol. 57 No. 10, pp. 3557 – 3564.

[15]A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks", Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.

[16]Crossbow Technology Inc., Processor/Radio Modules,

[17]Bruce schneier, “cryptographie appliquée algorithms, protocoles“, 2nd edition wiley, 2001.

[18]Syed Muhammad Khaliq-ur-RahmanRaazi and SungyoungLee .“A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks”.Journal of Computing Science and Engineering, Vol. 4, No. 1, 2010.

[19]Wang, Y. ; Attebury, G. & Ramamurthy, B. “A survey of security issues in wireless sensor networks”. IEEE Communications Surveys and Tutorials, Vol. 8, N 2, pp. 2-23, 2006.