DOI QR코드

DOI QR Code

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN

  • Senthil, T. (Kalasalingam University) ;
  • Kannapiran, Dr.B. (Kalasalingam University)
  • Received : 2016.03.15
  • Accepted : 2016.10.15
  • Published : 2016.11.30

Abstract

A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory. Energy is the lifeblood of sensors and thus energy conservation is a critical necessity of WSN. This paper proposes a clustering algorithm namely Energy Efficient Trustworthy Clustering algorithm (EETCA), which focuses on three phases such as chief node election, chief node recycling process and bi-level trust computation. The chief node election is achieved by Dempster-Shafer theory based on trust. In the second phase, the selected chief node is recycled with respect to the current available energy. The final phase is concerned with the computation of bi-level trust, which is triggered for every time interval. This is to check the trustworthiness of the participating nodes. The nodes below the fixed trust threshold are blocked, so as to ensure trustworthiness. The system consumes lesser energy, as all the nodes behave normally and unwanted energy consumption is completely weeded out. The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.

Keywords

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., "Wireless sensor networks: A survey," Comput. Netw, Vol.38, pp.393-422, 2002. https://doi.org/10.1016/S1389-1286(01)00302-4
  2. Yick, J., Mukherjee, B., Ghosal, D., "Wireless sensor network survey," Comput. Netw., vol.52, pp. 2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
  3. H. Chan, A. Perrig, "Security and privacy in sensor networks," IEEE Computer, vol.36, no.10, pp.103-105, 2003.
  4. Y.M. Huang, M.Y. Hsieh, H.C. Chao, S.H. Hung, J.H. Park, Pervasive, "Secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks," IEEE Journal on Selected Areas of Communications, vol. 27, no.4, pp.400-411, 2009. https://doi.org/10.1109/JSAC.2009.090505
  5. S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1-37, May 2008.
  6. G. Zhan, W. Shi, and J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Trans. Depend. Secure Comput., vol. 9, no. 2, pp. 184-197, Apr. 2012. https://doi.org/10.1109/TDSC.2011.58
  7. E. Aivaloglou and S. Gritzalis, "Hybrid trust and reputation management for sensor networks," Wireless Netw., vol. 16, no. 5, pp.1493-1510, Jul. 2010. https://doi.org/10.1007/s11276-009-0216-8
  8. A.Rezgui andM. Eltoweissy, "${\mu}RACE$ : A reliable adaptive service driven efficient routing protocol suite for sensor-actuator networks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 5, pp. 607-622, May 2009. https://doi.org/10.1109/TPDS.2008.94
  9. S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Workshop Security of ad hoc and Sensor Networks (SASN'04), pp. 66-67, Oct. 2004.
  10. Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Proc. of Third IEEE Int. Conf. Mobile Ad-Hoc and Sensor Systems (MASS'06), pp. 437-446, Oct. 2006.
  11. R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, and S. Lee, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 11, pp.1698-1712, Nov. 2009. https://doi.org/10.1109/TPDS.2008.258
  12. F. Bao, I. Chen,M.Chang, and J. Cho, "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection," IEEE Trans. Netw. Service Manag., vol. 9, no. 2, pp. 169-183, Jun. 2012. https://doi.org/10.1109/TCOMM.2012.031912.110179
  13. G. V. Crosby, N. Pissinou, and J. Gadze, "A framework for trust-based cluster head election in wireless sensor networks," in Proc. of Second IEEEWorkshop on Dependability and Security in Sensor Networks and Systems, pp. 10-22, 2006.
  14. R. A. Raje and A. V. Sakhare, "Routing in wireless sensor network using fuzzy based trust model," in Proc. of the 4th International Conference on Communication Systems and Network Technologies (CSNT '14), pp. 7-9, 2014.
  15. W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd International Conference on System Sciences, pp. 1-10, Maui, Hawaii, USA, 2000.
  16. W. Wang, F. Du, and Q. Xu, "An improvement of LEACH routing protocol based on trust for wireless sensor networks," in Proc. of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '09), pp. 1-4, Beijing, China, September 2009.
  17. Yuxin Liu, Mianxiong Dong, Kaoru Ota, Anfeng Liu, "ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, pp. 2013-2027, 2016. https://doi.org/10.1109/TIFS.2016.2570740
  18. Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, Abdul Waheed Khan, "TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network," IEEE Sensors Journal, Vol. 15, No. 12, pp.6962-6972, 2015. https://doi.org/10.1109/JSEN.2015.2468576
  19. Junqi Duan, Deyun Gao, Dong Yang, Chuan Heng Foh, Hsiao-Hwa Chen, "An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications," IEEE Internet of Things Journal, Vol.1, No.1, pp. 58-69, 2014. https://doi.org/10.1109/JIOT.2014.2314132
  20. Shuaishuai Tan, Xiaoping Li, Qingkuan Dong, "A Trust Management System for Securing Data Plane of Ad-Hoc Networks," IEEE Transactions on Vehicular Technology, Vol.35, No.9, pp. 7579-7592, 2015.
  21. Mohamed M.E.A. Mahmoud, Xiaodong Lin, Xuemin (Sherman) Shen, "Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.4, pp.1140-1153, 2013. https://doi.org/10.1109/TPDS.2013.138
  22. Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, Mohsen Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.5, pp. 1228-1237, 2015. https://doi.org/10.1109/TPDS.2014.2320505
  23. Dempster, A. P., "Upper and lower probabilities induced by a multivalued mapping," The Annals of Mathematical Statistics, vol.38, No.2, pp.325-339, 1967. https://doi.org/10.1214/aoms/1177698950
  24. Thomas M. Chen and Varadharajan Venkataramanan, "Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks," IEEE Internet Computing, Vol.9, pp.35-41, 2005.
  25. Zuo Chen, Min He, Wei Liang, and Kai Chen, "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network," Journal of Sensors, vol.2015, pp. 1-10, 2015.

Cited by

  1. A new clustering algorithm based on the connected region generation vol.12, pp.6, 2018, https://doi.org/10.3837/tiis.2018.06.010