Keywords

1 Introduction

Wireless sensor networks (WSNs) play a crucial role in the communication technology. WSNs contain sensor nodes that are distributed geographically. The utilization of WSNs is extended to the field of resource monitoring [1, 2], structural monitoring [3, 4], environmental monitoring [5,6,7], health monitoring [8, 9], and animal tracking [10, 11]. The sensor nodes collect the data from the environment and forwards to the base stations. The sensor nodes work with the battery power. Therefore, they work for a limited time. Figure 1 shows the composition of WSNs.

Fig. 1
figure 1

Organization of wireless sensor network

WSNs are composed of major challenges such as to minimize the energy consumption and to increase the node lifetime. The efficient routing mechanisms are needed to increase the data accuracy, to decrease the cost, to increase the throughput, and to provide the security in sensor networks.

2 Characteristics of WSNs

At the time of routing, the node properties decide the characteristics of networks which are given below. In [12], the network cost is defined as the organized cost of the path from source to destination. In [13], the clustering coefficient is measured by using the localized connection of the nearer nodes. In [14], the authors define the degree of the node by calculating the direct connections of the source node.

2.1 Energy Efficient Protocols in WSNs

In WSNs, energy management of the nodes is treated as an important issue. In [15], authors proposed the dynamic power management routing protocol to handle the energy management in sensor networks. This protocol automatically turns off the nodes that are in idle state to preserve the battery power. In [16], Jing-hui Zhong made an attempt to increase the lifetime of the network by preserving the energy using the Local Wake-up Scheduling (LWS). A bioinspired approach called as ant colony optimization is used to achieve the energy optimization. In the LWS, the network is divided into two groups. One group is in active mode and another group is in sleep mode. If the nodes in the active group drain their energy, then the nodes automatically go to the sleep state, and the nodes in the other group come alive.

In [17], sleep scheduling algorithm is proposed for multiple target tracking in sensor networks (SSMTT). For every node, the scheduling time is in the dynamic nature, i.e., based on the network condition. If the nodes are in the active state, the sleep time is scheduled, and if the nodes are in the sleep state, the wake-up time is initiated. SSMTT is more useful in conserving the energy of the sensor nodes.

In [18], the authors made a contribution by proposing the medium reservation preamble-based MAC protocol (MRPM). The nodes in the network are contended for the channel allocation within the duration period. When the nodes are in the active state, they contend for the channel; otherwise, they simply ignore the period of contention. The authors also made some modifications by shortening the contention period using the combination of both SYNC and RTS packets.

With the combination of ACO and SSMTT, a better resource allocation protocol is designed by the authors in [19]. This protocol makes the sleep nodes active with less energy consumption. In [20], a low power state routing protocol was designed to schedule the activities to the nodes when they are in active or sleep states. The nodes consume more energy when they need to change the states from sleep to active. It is more than the energy consumed for the packet transfer. Therefore, the nodes having the less energy will be kept in idle state, where they can listen to the packet, but they cannot transfer or receive the packet. The proposed protocol is efficient in covering the sensor region and also the connectivity of the network.

In [21], the TEEM protocol is designed by combining the RTS into a single packet. The TEEM protocol is faster when compared to the S-MAC, and also, it minimizes the energy consumption and maximizes the lifetime of the sensor network. The node listening period is minimized.

In [22], the authors made an attempt to minimize the energy consumption by implementing the ant colony-based AODV (EACAODV) method. The performance of the proposed model is tested with the packet delivery ratio and energy consumption of the network. The results proved that EACAODV is efficient in reducing the network energy.

3 Conventional Routing Protocols in WSNs

The nodes in the sensor network are dedicated to collect the data from the deployed environment and to forward the data to the base station with the help of intermediate nodes. The collected data is forwarded through the access points or gateways to the outer region. The properties of the gateways or access points may be static or dynamic.

The network layer plays a major role in managing the path routing from source to destination. The network layer follows the properties which are as follows:

  • Energy management is the threatening issue in the WSNs. Therefore, the energy management protocols are necessary to manage the acquired resources.

  • Multi-hop routing is followed by the network layer to establish the connection between source nodes to the base station.

  • Data redundancy is another major issue in the WSN, the data duplicates cannot be avoided by the sensor nodes. Therefore, to reduce the data redundancy, suitable protocols need to be designed.

In [23], the authors proposed many protocols by considering the above factors. Among them, some of the protocols are classified as follows:

  • Hierarchical routing protocols,

  • Data-centric routing protocols, and

  • Location-based routing protocols.

3.1 Hierarchical Routing Protocols

These protocols are more popular in preserving the energy of the nodes. It implements the clustering mechanism to organize the group of sensor nodes in the network. The sensor node which is having the more residual energy is selected as the cluster head, and it is responsible for forwarding the data from the source node to the base station.

  • Power Efficient Gathering in Sensor Information Systems (PEGSIS) [24]:

The PEGSIS protocol is an energy management protocol where the nearby nodes are used for data exchange and also these nodes will form a chain. The communication establishment between the nodes is done by the traditional algorithms. This PEGSIS has the higher functionality compared to the LEACH. In PEGSIS, there are no policies for selecting the cluster head, energy of the nodes, and location of the nodes. The major drawback for the PEGSIS is data redundancies caused by clustering procedure.

  • Power-Aware Clustered TDMA (PACT) [25]:

PACT is one of the efficient hierarchical protocols where the cluster head is selected based on the passive election model. The nodes which have the maximum residual energy are selected as cluster heads. The communication to the base station is established through the source nodes and cluster heads. In AODV routing protocol, the gateways and the cluster head are used to transfer to the data to improve the forwarding efficiency in the MANETs [26].

  • Low Energy Adaptive Clustering Hierarchy (LEACH) [27]:

LEACH is one type of adaptive protocol having the highest preference in the hierarchical group. It follows the random selection procedure to elect the cluster head. Later it changes the cluster head over time. The selection of cluster head in the next stages is carried by calculating the distance between the sensor nodes and the cluster head. The major disadvantage of the LEACH is it not suitable for the larger networks and also the network overhead caused by the random selection procedure for cluster head.

  • Shortest Hop Routing Tree Protocol [28]:

The shortest path routing protocol works on the principle of collecting only the useful data from the sensor nodes. This will minimize the energy waste in the sensor nodes. The cluster head selection of the proposed routing protocol is based on the highest battery power of the nodes.

  • Extending Lifetime of the Cluster Head (ELCH) [29]:

In ELCH protocol, the cluster head selection process is carried by using the voting policy. The cluster head is selected based on the highest polls voted by the sensor nodes. The ELCH Protocol has the self-configurable and hierarchal properties.

  • Tree-based Efficient Protocol for Sensor Information [30]:

The tree-based routing protocol adapts the tree structure to transfer the sensed data. In general, there are two methods to construct the tree model. One model is to compute the cost of each path from source node to the base station, and the second one is to find the local algorithm for each sensor node. Here, the local algorithm is implemented using the tree traversal algorithm.

  • Threshold Sensitive Energy Efficient (TEEN) [31]:

This protocol has the special properties that can adjust to any unexpected situations in the wireless sensor networks. The major thing in the network is quick response to the critical applications such as environmental disasters. The architecture of the proposed protocol follows the hierarchical routing. The major drawback of the TEEN protocol is it consumes more energy.

3.2 Data-Centric Routing Protocols

Data-centric routing protocols are also referred with query-based routing protocols and it works on the principle of gathering the data by the sensor nodes based on the query processing. The protocols define the set of sensor nodes and process the data aggregation. For connection establishment, data-centric routing protocols follow the on-demand routing.

  • Flooding and Gossiping [32]:

Flooding is the mechanism where the sensor nodes gather the data and forward to the nearest nodes until it reaches the sink node. The major drawback of the flooding is it causes collisions, requires more energy, and produces data redundancy. The gossiping is the technique where the sensor nodes gather the data and forward to the random nodes. The major drawback for gossiping is delay.

  • Data Diffusion [33, 34]:

Data diffusion is defined as the process of dividing the sensor nodes into groups based on the data generated. When the query is posted in the network, all the nodes gather the data for aggregation process. As a next step, the aggregated data is forwarded to the base station. The base station checks the aggregated data and sends to the neighboring nodes. The nodes verify the received data and collect the data accordingly. The major drawback of this protocol is data redundancy.

  • Sensor Protocols for Information via Negotiation [32]:

This protocol is efficient in terms of reducing redundancy and preserving the energy. The protocol predicts that all the nodes in the neighboring region may contain the similar data. Therefore, the protocol compares the aggregated data with received data from the base station. The nodes with low redundant data are selected and forwards to the base station. This protocol is efficient and simpler to implement.

3.3 Location-Based Routing Protocols

In general, WSNs consists of thousands of sensor nodes, and they are not organized with any IP-based addressing scheme. Therefore, to locate the sensor nodes, their location information is considered. The location-based routing protocols use global positioning system (GPS) to collect the location information of the sensor nodes, but this process leads to the energy consumption [35].

  • Minimum Energy Communication Network (MECN) [36]:

MECN is the efficient routing mechanism in location-based routing protocols. This protocol discards the weak nodes and reconfigures the network by regrouping. MECN utilizes minimum energy for data forwarding and also it finds the relay nodes in the network to transfer the data instead of direct transmission.

  • Small Minimum Energy Communication Network (SMECN) [37]:

SMECN is the advanced version of the MECN, where it contains minimum number of sensor nodes to form the group. SMECN consumes less energy compared to the MECN due to the smaller network, but the network overhead will be high for searching the subnetwork with limited number of sensor nodes.

  • Geographic and Energy-Aware Routing (GEAR) [38]:

GEAR is a major routing protocol in WSNs and it is treated as the alternative to the GPS usage in location prediction. The major motive of the proposed protocol is to decrease the energy consumption of the network and increase the network lifetime. The function of the GEAR is to collect the data from the sensor nodes according to the query and sends the data to the particular location where the data is required.

  • Geographic Adaptive Fidelity(GAF) [39]:

GAF is practically designed for routing in the MANETs, and then it is extended to use in the WSNs. The basic principle of GAF is to create the virtual grid based on the nodes location information. This protocol utilizes the GPS location of the sensor nodes for cluster formation. GAF preserves the energy of the network by making the idle nodes into inactive state, and also, it increases the lifetime of the sensor nodes. It uses the dynamic resource routing in WSNs.

4 Secure Routing in WSNs

In WSNs, the sensor nodes are deployed in different regions to collect information, and this information is sent to the sink nodes where it can be used by the application [40]. This type of sensor nodes generally gathers the information and transfers to the base station. This type of information gathering in the distributed environment is called as data aggregation and requires aggregation of data from same occurrences. The major motive of data aggregation is to maximize the network lifetime with the help of minimizing the resource utilization of the nodes such as bandwidth, energy consumption, and battery power. To achieve the increment in network lifetime, an efficient routing protocol is necessary. The routing protocols should address the QoS metrics such as fault tolerance, latency, data accuracy, and security.

In the data aggregation process, the design of architecture for WSNs plays a crucial role. There are a number of protocols which provides routing and data aggregation at the same time. These protocols are divided into two types: cluster-based routing protocols and tree-based routing protocols. In [41, 42], the authors made contributions by developing the shortest path tree-based structures. But the disadvantages are not addressing the resource constraints of WSN. In [43], the data aggregation protocol is presented along with the security enhancement. This is because malicious nodes can compromise the data aggregation results.

In WSNs, security is one of the major requirements to protect the nodes from malicious attacks. Some of the characteristics of sensor nodes will compromise the security features when they are deployed in remote environments. The wireless medium is the primary target of the attackers, which is open to everyone. The attackers had the advantage to access the transmitted packets easily by compromising the sensor nodes. The second one is, sensor nodes which are deployed in the WSN environment have limited resources, and therefore it is difficult to implement robust security mechanisms [44,45,46].

In recent years, some of the secure data aggregation routing protocols are presented. These protocols are not completely sufficient to address the vulnerabilities of the WSN, but they will provide an overview of possible mechanisms for securing data aggregation.

In [47], Jacques et al. proposed the end-to-end encryption mechanism for secure data aggregation which uses the smaller key size and elliptic curve cryptography. This approach restricts the usage of two same texts for the cryptography and also does not allow the usage of a large number of operations over the ciphertext. The major advantage of this encryption scheme is it allows the small asymmetric encrypted keys that are crucial for sensor nodes. The drawback of the end-to-end encryption mechanism is time delay between the packet deliveries which will ultimately affect the network performance.

In [48], Prakash et al. presented the data aggregation model along with privacy-preserving scheme. The approach is simply called as cluster-based private data aggregation. The main feature of this protocol is to preserve the security at the time of data aggregation. This approach will provide less communication overhead over the WSN. The proposed method does not guarantee the fault tolerance, which is a primary concern for secure data aggregation.

In [49] Saut et al. presented the authentication and aggregation model for sensor motes (DAA). This model integrated the functionalities of authentication, data aggregation, and false data detection. The data aggregator node performs the data aggregation and performs data validation with authentication codes for their corresponding nodes. This approach follows the data confidentiality among the nodes by sending the encrypted data. Due to the utilization of encrypted keys, the network overhead is high in this approach.

Roy et al. [50] surveyed the problem of security in WSNs. One compromised sensor node will render the whole network useless and untruthful. They developed secure data aggregation protocols are strong against the intruders and the public key compromises. But the major issue in this protocol is that every time the size of the aggregated data is expanded when it was forwarded to the intermediate nodes.

Othman et al. [51] developed a secure data aggregation protocol to manage the queries over the data collected by the sensor nodes. The proposed protocol is designed especially for securing the computation at the time of data aggregation. However, this protocol manages to provide the data authentication. But still, the data sent from the sensor nodes to the data aggregator is a plaintext. It means the protocol fails to provide security at the time of data transmission.

Rezvani et al. [52] proposed the protocol to address the collusion attacks in WSNs. This protocol follows the iterative filtering algorithm to restrict the unwanted traffic in the network. The proposed protocol is robust against the collusion attacks, but the communication overhead is high in the network. Ouada et al. [53] developed lightweight-based authentication protocol for preserving the energy and providing the security in the wireless sensor networks. This protocol uses identity-based encryption in order to reduce the energy from the public key certificate management. This protocol achieved satisfying results in providing the security. The drawback of this protocol is it concentrates on the energy consumption and the data encryption is not employed to preserve the security. The comparison of secure data aggregation protocols is given in Table 1.

Table 1 .

By observing the above-discussed protocols, it can be stated that the behavior of the sensor networks makes the sensor nodes prone to the different type of attacks. Therefore, an efficient data aggregation scheme is necessary to address the data security, energy consumption, data accuracy, and propagation delay.

5 Conclusion

Routing in wireless sensor networks is a new research filed with increasing set of research results with limited flexibility. In this paper, we made a comprehensive survey on conventional routing mechanisms as well as secure routing mechanisms. All the routing mechanisms have the common motive of extending the lifetime of the nodes, while not compromising the security parameters. Overall, the routing mechanisms are classified into three categories such as hierarchical, location-based, and data-centric routing protocols. We highlighted the challenges and future scope of each routing techniques. Although all the routing protocols promising in the sensor networks, still there is need to address many challenges.