DOI QR코드

DOI QR Code

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm

  • Dahane, Amine (Intelligent Systems Research Laboratory, University of Sciences and Technology of Oran) ;
  • Berrached, Nasr-Eddine (Intelligent Systems Research Laboratory, University of Sciences and Technology of Oran) ;
  • Loukil, Abdelhamid (Intelligent Systems Research Laboratory, University of Sciences and Technology of Oran)
  • 투고 : 2014.05.23
  • 심사 : 2014.11.20
  • 발행 : 2015.06.30

초록

In this paper, we present a virtual laboratory platform (VLP) baptized Mercury allowing students to make practical work (PW) on different aspects of mobile wireless sensor networks (WSNs). Our choice of WSNs is motivated mainly by the use of real experiments needed in most courses about WSNs. These experiments require an expensive investment and a lot of nodes in the classroom. To illustrate our study, we propose a course related to energy efficient and safe weighted clustering algorithm. This algorithm which is coupled with suitable routing protocols, aims to maintain stable clustering structure, to prevent most routing attacks on sensor networks, to guaranty energy saving in order to extend the lifespan of the network. It also offers a better performance in terms of the number of re-affiliations. The platform presented here aims at showing the feasibility, the flexibility and the reduced cost of such a realization. We demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.

키워드

참고문헌

  1. K. Wong, T. Wolf, S. Gorinsky, and J. Turner, "Teaching experiences with a virtual network laboratory," ACM SIGCSE Bulletin, vol. 39, no. 1, pp. 481-485, 2007. https://doi.org/10.1145/1227504.1227473
  2. T. H. Hai, E. N. Huh, and M. Jo, "A lightweight intrusion detection framework for wireless sensor networks," Wireless Communications and Mobile Computing, vol. 10, no. 4, pp. 559-572, 2010. https://doi.org/10.1002/wcm.785
  3. E. N. Huh and T. H. Hai, Lightweight Intrusion Detection for Wireless Sensor Networks. Rijeka, Croatia : INTECH Open Access Publisher, 2011.
  4. Omnet official site [Online], Available: http://www.omnetpp.org.
  5. Castalia official site [Online]. Available: https://castalia.forge.nicta.com.au/index.php/en/index.html.
  6. The Network Simulator (ns-2) [Online]. Available: http://www.isi.edu/nsnam/ns.
  7. OPNET official site [Online]. Available: http://www.riverbed.com/products/performance-management-control/opnet.html?redirect=opnet.
  8. Tcl SourceForge Project [Online]. Available: http://tcl.sourceforge.net/.
  9. D. Mechta, S. Harous, M. Djoudi, and A. Douar, "A collaborative learning environment for a biology practical work," in Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS2010), Paris, 2010, pp. 389-394.
  10. M. Chatterjee, S. K. Das, and D. Turgut, "WCA: a weighted clustering algorithm for mobile ad hoc networks," Cluster Computing, vol. 5, no. 2, pp. 193-204, 2002. https://doi.org/10.1023/A:1013941929408
  11. W. Choi and M. Woo, "A distributed weighted clustering algorithm for mobile ad hoc networks," in Proceedings of Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), Guadeloupe, French Caribbean, 2006, pp. 73-73.
  12. A. Zabian, A. Ibrahim, and F. Al-Kalani, "Dynamic head cluster election algorithm for clustered Ad-Hoc networks," Journal of Computer Science, vol. 4, no. 1, pp. 42-50, 2008. https://doi.org/10.3844/jcssp.2008.42.50
  13. M. Chawla, J. Singhai, and J. L. Rana, "Clustering in mobile ad hoc networks: a review," International Journal of Computer Science and Information Security, vol. 8, no. 2, pp. 293-301, 2010.
  14. S. Mehta, P. Sharma, and K. Kotecha, "A survey on various cluster head election algorithms for MANET," in Proceedings of 2011 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, 2011, pp. 1-6.
  15. H. Kim, "An efficient clustering scheme for data aggregation considering mobility in mobile wireless sensor networks," International Journal of Control and Automation, vol. 6, no. 1, pp. 221-234, 2013.
  16. M. Chatterjee, S. K. Das, and D. Turgut, "A weight based distributed clustering algorithm for mobile ad hoc networks," in Proceedings of the 7th International Conference on High Performance Computing (HiPC2000), Bangalore, India, 2000, pp. 511-521.
  17. R. Agarwal, R. Gupta, and M. Motwani, "Review of weighted clustering algorithms for mobile ad hoc networks," Computer Science & Telecommunications, vol. 33, no. 1, pp. 71-78, 2012.
  18. A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, no. 14, pp. 2826-2841, 2007. https://doi.org/10.1016/j.comcom.2007.05.024
  19. K. A. Darabkh, S. S. Ismail, M. Al-Shurman, I. F. Jafar, E. Alkhader, and M. F. Al-Mistarihi, "Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 2068-2080, 2012. https://doi.org/10.1016/j.jnca.2012.08.008
  20. V. Geetha, P. V. Kallapur, and S. Tellajeera, "Clustering in wireless sensor networks: performance comparison of LEACH & LEACH-C protocols using NS2," Procedia Technology, vol. 4, pp. 163-170, 2012. https://doi.org/10.1016/j.protcy.2012.05.024
  21. Y. Wang, X. Wu, J. Wang, W. Liu, and W. Zheng, "An OVSF code based routing protocol for clustered wireless sensor networks," International Journal of Future Generation Communication and Networking, vol. 5, no. 3, pp. 117-128, 2012.
  22. E. Ekici, Y. Gu, and D. Bozdag, "Mobility-based communication in wireless sensor networks," IEEE Communications Magazine, vol. 44, no. 7, pp. 56-62, 2006.
  23. J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol. 7, no. 1, pp. 32-48, 2005. https://doi.org/10.1109/COMST.2005.1423333
  24. B. Sun, C. Gui, Y. Song, and C. Hu, "Stable clusterhead selection algorithm for ad hoc networks," International Journal of Future Generation Communication and Networking, vol. 6, no. 3, pp. 95-105, 2013.
  25. I. I. Er and W. K. G. Seah, "Mobility-based d-hop clustering algorithm for mobile ad hoc networks," in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, 2004, pp. 2359-2364.
  26. T. Kavitha and D. Sridharan, "Security vulnerabilities in wireless sensor networks: a survey," Journal of Information Assurance and Security, vol. 5, no. 1, pp. 31-44, 2010.
  27. A. Dahane, N. Berrached, and B. Kechar, "Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks," Procedia Computer Science, vol. 34, pp. 63-70, 2014. https://doi.org/10.1016/j.procs.2014.07.040
  28. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002. https://doi.org/10.1023/A:1016598314198
  29. S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network (SASN2004), Washington, DC, 2004, pp. 66-77.
  30. I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Proceedings of International Conference on Dependable Systems and Networks (DSN2005), Yokohama, Japan, 2005, pp. 612-621.
  31. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, 2000, pp. 255-265.
  32. K. Benahmed, H. Haffaf, and M. Merabti, "Monitoring of wireless sensor networks," in Sustainable Wireless Sensor Networks, W. Seah and Y. K. Tan, Eds. Rijeka, Croatia: InTech, 2010.
  33. C. Hsin and M. Liu, "Self-monitoring of wireless sensor networks," Computer Communications, vol. 29, no. 4, pp. 462-476, 2006. https://doi.org/10.1016/j.comcom.2004.12.031
  34. Y. Yu and L. Zhang, "A secure clustering algorithm in mobile ad hoc networks," in Proceedings of 2012 IACSIT Hong Kong Conferences (IPCSIT vol. 29), 2012, pp. 73-77.
  35. X. Liu, "A survey on clustering routing protocols in wireless sensor networks," Sensors, vol. 12, no. 8, pp. 11113-11153, 2012. https://doi.org/10.3390/s120811113
  36. S. Taneja and A. Kush, "A Survey of routing protocols in mobile ad hoc networks," International Journal of Innovation, Management and Technology, vol. 1, no. 3, 279-285, 2010.
  37. C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 234-244, 1994. https://doi.org/10.1145/190809.190336
  38. A. P. R. da Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, Canada, 2005, pp. 16-23.
  39. M. S. Islam and S. A. Rahman, "Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches," International Journal of Advanced Science and Technology, vol. 36, no. 1, pp. 1-8, 2011.
  40. S. Marchesani, L. Pomante, M. Pugliese, and F. Santucci, "A middleware approach to provide security in IEEE 802.15. 4 wireless sensor networks," in Proceedings of International Conference on Mobile Wireless Middleware, Operating Systems and Applications (Mobilware), Bologna, Italy, 2013, pp. 85-93.
  41. H. Ghamgin, M. S. Akhgar, and M. T. Jafari, "Attacks in Wireless Sensor Network," Journal of Applied Sciences Research, vol. 7, no. 7, pp. 954-960, 2011.
  42. D. Martins and H. Guyennet, "Security in wireless sensor networks: a survey of attacks and countermeasures," International Journal of Space-Based and Situated Computing, vol. 1, no. 2, pp. 151-162, 2011. https://doi.org/10.1504/IJSSC.2011.040341
  43. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
  44. A. Sheth, C. Hartung, and R. Han, "A decentralized fault diagnosis system for wireless sensor networks," in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, 2005.
  45. I. Khalil, S. Bagchi, N. F. Shroff, "MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, 2008. https://doi.org/10.1016/j.adhoc.2007.02.001
  46. S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, "Detecting selective forwarding attacks in wireless sensor networks using support vector machines," in Proceedings of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP2007), Melbourne, Australia, 2007, pp. 335-340). IEEE.
  47. S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Troy, New York, Technical Report 05-07, 2005.
  48. P. Berwal, "Security in wireless sensor networks: issues and challenges," International Journal of Engineering and Innovative Technology, vol. 3, no. 5, pp.192-198, 2013.
  49. W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. Harlow: Pearson Education, 2010.
  50. A. S. K. Pathan, H. W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT2006), Phoenix Park, Korea, 2006, pp. 1048-1054.
  51. R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y. J. Song, "Trust management problem in distributed wireless sensor networks," in Proceedings of 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Sydneyt, 2006, pp. 411-414.
  52. A. H. Hussein, A. O. Abu Salem, and S. Yousef, "A flexible weighted clustering algorithm based on battery power for Mobile Ad hoc Networks," in Proceedings of IEEE International Symposium on Industrial Electronics (ISIE2008), Cambridge, UK, 2008, pp. 2102-2107.
  53. C. Li, Y. Wang, F. Huang, and D. Yang, "A novel enhanced weighted clustering algorithm for mobile networks," in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'09), Beijing, China, 2009, pp. 1-4.
  54. S. Soro and W. B. Heinzelman, "Cluster head election techniques for coverage preservation in wireless sensor networks," Ad Hoc Networks, vol. 7, no. 5, pp. 955-972, 2009. https://doi.org/10.1016/j.adhoc.2008.08.006
  55. M. Lehsaini, H. Guyennet, and M. Feham, "An efficient cluster-based self-organisation algorithm for wireless sensor networks," International Journal of Sensor Networks, vol. 7, no. 1, pp. 85-94, 2010. https://doi.org/10.1504/IJSNET.2010.031852
  56. K. Benahmed, M. Merabti, and H. Haffaf, "Distributed monitoring for misbehaviour detection in wireless sensor networks," Security and Communication Networks, vol. 6, no. 4, pp. 388-400, 2013. https://doi.org/10.1002/sec.624