International Journal of Computer Science and Network
Routing protocols in WSNs might differ depending on the application and network architecture. Routing protocols that do not take the malicious attacks into account cannot be easily tamper proofed. Wireless sensor networks consist of small nodes with sensing, computation, and wireless communication capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issues. These protocols should be designed securely so that they are capable of asserting countermeasures whenever they need to.