Browse > Article

A Secure Cluster Formation Scheme in Wireless Sensor Networks  

Wang, Gi-Cheol (Korea Institute of Science and Technology Information)
Cho, Gi-Hwan (Chonbuk National University)
Publication Information
Abstract
In wireless sensor networks, cluster structure brings on many advantages such as load balancing, energy saving, and distributed key management, and so on. To transform a physical network into the cluster structure, sensor nodes should invoke a cluster formation protocol. During the protocol operation, if some nodes are compromised and they do not conform to the protocol, an inconsistency of membership in a cluster happen. This splits the cluster and consequently increases the number of clusters and decreases the number of members in the cluster. In this paper, we propose a scheme which well copes with such a problem. First, our scheme generates two hop clusters where hop distance between any two nodes is at most two. Besides, our scheme employs verification of two hop distant nodes to prevent the cluster split induced by compromised nodes. Last, our scheme mainly employs broadcast transmissions to reduce energy consumption of nodes. Simulation results have proven that our scheme reduces the number of clusters and more secure and energy-efficient than other scheme.
Keywords
클러스터 구성;보안;무선 센서 네트워크;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Transactions on Wireless Communications, Vol. 1, No. 4, pp. 660-670, Oct. 2002.   DOI   ScienceOn
2 O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Transactions on Mobile Computing, Vol. 3, No. 4, pp. 366-379, Oct. 2004.   DOI   ScienceOn
3 G. Gupta and M. Younis, "Performance Evaluation of Load-Balanced Clustering of Wireless Sensor Networks," in Proc. of the 10th Int'l Conf. on Telecommunications, Vol. 2, pp. 1577-1583, Mar. 2003.
4 G. Wang, K. Song, and G. Cho, "DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks," IEICE Transactions on Information and Systems, Vol. E93-D, No. 6, pp. 1560-1571, Jun. 2010   DOI   ScienceOn
5 G. Wang and G. Cho, "Clustering-based Key Renewals for Clustered Sensor Networks," IEICE Transactions on Communications, Vol. E92-B, No. 2, 612-615, Feb. 2009.   DOI   ScienceOn
6 M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao, "Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks," in Proc. of Int'l Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 1-10, Apr. 2007.
7 Q. Dong and D. Liu, "Resilient Cluster Leader Election for Wireless Sensor Networks, in Proc. of IEEE 6th Annual Communication Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 108-116, Rome, Italy, Jun. 2009.
8 G. Wang and G. Cho, "Secure Cluster Head Election Using Mark Based Exclusion in Wireless Sensor Networks," IEICE Transactions on Communications, Vol. E93-B, No. 11, pp. 2925-2935, Nov. 2010.   DOI   ScienceOn
9 A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro, "On the Security of Cluster-based Communication Protocols for Wireless Sensor Networks," in Proc. of 4th IEEE Int'l Conf. on Networking, Vol. 3420, pp. 449-458, 2005.
10 L. B. Oliveira, H. C. Wong, M. W. Bern, R. Dahab, and A. A. Loureiro, "SecLEACH-A Random Key Distribution Solution for Securing Clustered Sensor Networks," in Proc. of 5th IEEE Int'l Symposium On Network Computing and Applications, pp. 145-154, Cambridge, MA, USA, Jul. 2006.
11 D. Liu, "Resilient Cluster Formation for Sensor Networks," in Proc. of 27th Int'l Conf. on Distributed Computing Systems, pp. 40-48, Toronto, ON, Canada, Jun. 2007.
12 K. Sun, P. Peng, P. Ning, and C. Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks," in Proc. of the 22nd Annual Conf. on Computer Security Applications, pp. 131-140, Miami, FL, USA, Dec. 2006.
13 A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, Vol. 8, No. 5, pp. 521-534, Sep. 2002.   DOI   ScienceOn
14 A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," in Proc. of 3rd Int'l Conf. on Pervasive Computing and Communications, pp. 324-328, Mar. 2005.
15 J. R. Douceur, "The Sybil Attack," in Proc. of the 1st Int'l Workshop on Peer-to-peer Systems, pp. 251-260, Cambridge, MA, USA, Mar. 7-8, Mar. 2002.
16 Y. C. Hu, A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 370-380, Feb. 2006   DOI
17 B. Parno, A. Perrig, and V. Gilgor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proc. of 2005 IEEE Symposium on Security and Privacy, pp. 49-63, Washington, DC, USA, May 2005.