Browse > Article
http://dx.doi.org/10.3745/JIPS.02.0019

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm  

Dahane, Amine (Intelligent Systems Research Laboratory, University of Sciences and Technology of Oran)
Berrached, Nasr-Eddine (Intelligent Systems Research Laboratory, University of Sciences and Technology of Oran)
Loukil, Abdelhamid (Intelligent Systems Research Laboratory, University of Sciences and Technology of Oran)
Publication Information
Journal of Information Processing Systems / v.11, no.2, 2015 , pp. 205-228 More about this Journal
Abstract
In this paper, we present a virtual laboratory platform (VLP) baptized Mercury allowing students to make practical work (PW) on different aspects of mobile wireless sensor networks (WSNs). Our choice of WSNs is motivated mainly by the use of real experiments needed in most courses about WSNs. These experiments require an expensive investment and a lot of nodes in the classroom. To illustrate our study, we propose a course related to energy efficient and safe weighted clustering algorithm. This algorithm which is coupled with suitable routing protocols, aims to maintain stable clustering structure, to prevent most routing attacks on sensor networks, to guaranty energy saving in order to extend the lifespan of the network. It also offers a better performance in terms of the number of re-affiliations. The platform presented here aims at showing the feasibility, the flexibility and the reduced cost of such a realization. We demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.
Keywords
Clustering; Energy Efficiency; Practical Work; Security Attacks; Virtual labs; Wireless Sensor Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Wong, T. Wolf, S. Gorinsky, and J. Turner, "Teaching experiences with a virtual network laboratory," ACM SIGCSE Bulletin, vol. 39, no. 1, pp. 481-485, 2007.   DOI
2 T. H. Hai, E. N. Huh, and M. Jo, "A lightweight intrusion detection framework for wireless sensor networks," Wireless Communications and Mobile Computing, vol. 10, no. 4, pp. 559-572, 2010.   DOI
3 E. N. Huh and T. H. Hai, Lightweight Intrusion Detection for Wireless Sensor Networks. Rijeka, Croatia : INTECH Open Access Publisher, 2011.
4 Omnet official site [Online], Available: http://www.omnetpp.org.
5 Castalia official site [Online]. Available: https://castalia.forge.nicta.com.au/index.php/en/index.html.
6 The Network Simulator (ns-2) [Online]. Available: http://www.isi.edu/nsnam/ns.
7 OPNET official site [Online]. Available: http://www.riverbed.com/products/performance-management-control/opnet.html?redirect=opnet.
8 Tcl SourceForge Project [Online]. Available: http://tcl.sourceforge.net/.
9 D. Mechta, S. Harous, M. Djoudi, and A. Douar, "A collaborative learning environment for a biology practical work," in Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS2010), Paris, 2010, pp. 389-394.
10 M. Chatterjee, S. K. Das, and D. Turgut, "WCA: a weighted clustering algorithm for mobile ad hoc networks," Cluster Computing, vol. 5, no. 2, pp. 193-204, 2002.   DOI
11 W. Choi and M. Woo, "A distributed weighted clustering algorithm for mobile ad hoc networks," in Proceedings of Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), Guadeloupe, French Caribbean, 2006, pp. 73-73.
12 A. Zabian, A. Ibrahim, and F. Al-Kalani, "Dynamic head cluster election algorithm for clustered Ad-Hoc networks," Journal of Computer Science, vol. 4, no. 1, pp. 42-50, 2008.   DOI
13 M. Chawla, J. Singhai, and J. L. Rana, "Clustering in mobile ad hoc networks: a review," International Journal of Computer Science and Information Security, vol. 8, no. 2, pp. 293-301, 2010.
14 S. Mehta, P. Sharma, and K. Kotecha, "A survey on various cluster head election algorithms for MANET," in Proceedings of 2011 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, 2011, pp. 1-6.
15 H. Kim, "An efficient clustering scheme for data aggregation considering mobility in mobile wireless sensor networks," International Journal of Control and Automation, vol. 6, no. 1, pp. 221-234, 2013.
16 M. Chatterjee, S. K. Das, and D. Turgut, "A weight based distributed clustering algorithm for mobile ad hoc networks," in Proceedings of the 7th International Conference on High Performance Computing (HiPC2000), Bangalore, India, 2000, pp. 511-521.
17 R. Agarwal, R. Gupta, and M. Motwani, "Review of weighted clustering algorithms for mobile ad hoc networks," Computer Science & Telecommunications, vol. 33, no. 1, pp. 71-78, 2012.
18 A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, no. 14, pp. 2826-2841, 2007.   DOI   ScienceOn
19 K. A. Darabkh, S. S. Ismail, M. Al-Shurman, I. F. Jafar, E. Alkhader, and M. F. Al-Mistarihi, "Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 2068-2080, 2012.   DOI   ScienceOn
20 V. Geetha, P. V. Kallapur, and S. Tellajeera, "Clustering in wireless sensor networks: performance comparison of LEACH & LEACH-C protocols using NS2," Procedia Technology, vol. 4, pp. 163-170, 2012.   DOI   ScienceOn
21 Y. Wang, X. Wu, J. Wang, W. Liu, and W. Zheng, "An OVSF code based routing protocol for clustered wireless sensor networks," International Journal of Future Generation Communication and Networking, vol. 5, no. 3, pp. 117-128, 2012.
22 E. Ekici, Y. Gu, and D. Bozdag, "Mobility-based communication in wireless sensor networks," IEEE Communications Magazine, vol. 44, no. 7, pp. 56-62, 2006.
23 J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol. 7, no. 1, pp. 32-48, 2005.   DOI   ScienceOn
24 B. Sun, C. Gui, Y. Song, and C. Hu, "Stable clusterhead selection algorithm for ad hoc networks," International Journal of Future Generation Communication and Networking, vol. 6, no. 3, pp. 95-105, 2013.
25 I. I. Er and W. K. G. Seah, "Mobility-based d-hop clustering algorithm for mobile ad hoc networks," in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, 2004, pp. 2359-2364.
26 T. Kavitha and D. Sridharan, "Security vulnerabilities in wireless sensor networks: a survey," Journal of Information Assurance and Security, vol. 5, no. 1, pp. 31-44, 2010.
27 I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Proceedings of International Conference on Dependable Systems and Networks (DSN2005), Yokohama, Japan, 2005, pp. 612-621.
28 A. Dahane, N. Berrached, and B. Kechar, "Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks," Procedia Computer Science, vol. 34, pp. 63-70, 2014.   DOI   ScienceOn
29 A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.   DOI   ScienceOn
30 S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network (SASN2004), Washington, DC, 2004, pp. 66-77.
31 S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, 2000, pp. 255-265.
32 K. Benahmed, H. Haffaf, and M. Merabti, "Monitoring of wireless sensor networks," in Sustainable Wireless Sensor Networks, W. Seah and Y. K. Tan, Eds. Rijeka, Croatia: InTech, 2010.
33 C. Hsin and M. Liu, "Self-monitoring of wireless sensor networks," Computer Communications, vol. 29, no. 4, pp. 462-476, 2006.   DOI   ScienceOn
34 Y. Yu and L. Zhang, "A secure clustering algorithm in mobile ad hoc networks," in Proceedings of 2012 IACSIT Hong Kong Conferences (IPCSIT vol. 29), 2012, pp. 73-77.
35 X. Liu, "A survey on clustering routing protocols in wireless sensor networks," Sensors, vol. 12, no. 8, pp. 11113-11153, 2012.   DOI
36 M. S. Islam and S. A. Rahman, "Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches," International Journal of Advanced Science and Technology, vol. 36, no. 1, pp. 1-8, 2011.
37 S. Taneja and A. Kush, "A Survey of routing protocols in mobile ad hoc networks," International Journal of Innovation, Management and Technology, vol. 1, no. 3, 279-285, 2010.
38 C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 234-244, 1994.   DOI
39 A. P. R. da Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, Canada, 2005, pp. 16-23.
40 S. Marchesani, L. Pomante, M. Pugliese, and F. Santucci, "A middleware approach to provide security in IEEE 802.15. 4 wireless sensor networks," in Proceedings of International Conference on Mobile Wireless Middleware, Operating Systems and Applications (Mobilware), Bologna, Italy, 2013, pp. 85-93.
41 H. Ghamgin, M. S. Akhgar, and M. T. Jafari, "Attacks in Wireless Sensor Network," Journal of Applied Sciences Research, vol. 7, no. 7, pp. 954-960, 2011.
42 D. Martins and H. Guyennet, "Security in wireless sensor networks: a survey of attacks and countermeasures," International Journal of Space-Based and Situated Computing, vol. 1, no. 2, pp. 151-162, 2011.   DOI
43 C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003.   DOI   ScienceOn
44 S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Troy, New York, Technical Report 05-07, 2005.
45 A. Sheth, C. Hartung, and R. Han, "A decentralized fault diagnosis system for wireless sensor networks," in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, 2005.
46 I. Khalil, S. Bagchi, N. F. Shroff, "MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, 2008.   DOI   ScienceOn
47 S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, "Detecting selective forwarding attacks in wireless sensor networks using support vector machines," in Proceedings of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP2007), Melbourne, Australia, 2007, pp. 335-340). IEEE.
48 P. Berwal, "Security in wireless sensor networks: issues and challenges," International Journal of Engineering and Innovative Technology, vol. 3, no. 5, pp.192-198, 2013.
49 W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. Harlow: Pearson Education, 2010.
50 A. S. K. Pathan, H. W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT2006), Phoenix Park, Korea, 2006, pp. 1048-1054.
51 R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y. J. Song, "Trust management problem in distributed wireless sensor networks," in Proceedings of 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Sydneyt, 2006, pp. 411-414.
52 M. Lehsaini, H. Guyennet, and M. Feham, "An efficient cluster-based self-organisation algorithm for wireless sensor networks," International Journal of Sensor Networks, vol. 7, no. 1, pp. 85-94, 2010.   DOI
53 A. H. Hussein, A. O. Abu Salem, and S. Yousef, "A flexible weighted clustering algorithm based on battery power for Mobile Ad hoc Networks," in Proceedings of IEEE International Symposium on Industrial Electronics (ISIE2008), Cambridge, UK, 2008, pp. 2102-2107.
54 C. Li, Y. Wang, F. Huang, and D. Yang, "A novel enhanced weighted clustering algorithm for mobile networks," in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'09), Beijing, China, 2009, pp. 1-4.
55 S. Soro and W. B. Heinzelman, "Cluster head election techniques for coverage preservation in wireless sensor networks," Ad Hoc Networks, vol. 7, no. 5, pp. 955-972, 2009.   DOI   ScienceOn
56 K. Benahmed, M. Merabti, and H. Haffaf, "Distributed monitoring for misbehaviour detection in wireless sensor networks," Security and Communication Networks, vol. 6, no. 4, pp. 388-400, 2013.   DOI