Browse > Article
http://dx.doi.org/10.3837/tiis.2016.11.013

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN  

Senthil, T. (Kalasalingam University)
Kannapiran, Dr.B. (Kalasalingam University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.11, 2016 , pp. 5437-5454 More about this Journal
Abstract
A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory. Energy is the lifeblood of sensors and thus energy conservation is a critical necessity of WSN. This paper proposes a clustering algorithm namely Energy Efficient Trustworthy Clustering algorithm (EETCA), which focuses on three phases such as chief node election, chief node recycling process and bi-level trust computation. The chief node election is achieved by Dempster-Shafer theory based on trust. In the second phase, the selected chief node is recycled with respect to the current available energy. The final phase is concerned with the computation of bi-level trust, which is triggered for every time interval. This is to check the trustworthiness of the participating nodes. The nodes below the fixed trust threshold are blocked, so as to ensure trustworthiness. The system consumes lesser energy, as all the nodes behave normally and unwanted energy consumption is completely weeded out. The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.
Keywords
WSN; network lifetime; clustering; trust; energy efficiency;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. V. Crosby, N. Pissinou, and J. Gadze, "A framework for trust-based cluster head election in wireless sensor networks," in Proc. of Second IEEEWorkshop on Dependability and Security in Sensor Networks and Systems, pp. 10-22, 2006.
2 R. A. Raje and A. V. Sakhare, "Routing in wireless sensor network using fuzzy based trust model," in Proc. of the 4th International Conference on Communication Systems and Network Technologies (CSNT '14), pp. 7-9, 2014.
3 W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd International Conference on System Sciences, pp. 1-10, Maui, Hawaii, USA, 2000.
4 W. Wang, F. Du, and Q. Xu, "An improvement of LEACH routing protocol based on trust for wireless sensor networks," in Proc. of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '09), pp. 1-4, Beijing, China, September 2009.
5 Yuxin Liu, Mianxiong Dong, Kaoru Ota, Anfeng Liu, "ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, pp. 2013-2027, 2016.   DOI
6 Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, Abdul Waheed Khan, "TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network," IEEE Sensors Journal, Vol. 15, No. 12, pp.6962-6972, 2015.   DOI
7 Junqi Duan, Deyun Gao, Dong Yang, Chuan Heng Foh, Hsiao-Hwa Chen, "An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications," IEEE Internet of Things Journal, Vol.1, No.1, pp. 58-69, 2014.   DOI
8 Shuaishuai Tan, Xiaoping Li, Qingkuan Dong, "A Trust Management System for Securing Data Plane of Ad-Hoc Networks," IEEE Transactions on Vehicular Technology, Vol.35, No.9, pp. 7579-7592, 2015.
9 Mohamed M.E.A. Mahmoud, Xiaodong Lin, Xuemin (Sherman) Shen, "Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.4, pp.1140-1153, 2013.   DOI
10 Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, Mohsen Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.5, pp. 1228-1237, 2015.   DOI
11 Dempster, A. P., "Upper and lower probabilities induced by a multivalued mapping," The Annals of Mathematical Statistics, vol.38, No.2, pp.325-339, 1967.   DOI
12 Thomas M. Chen and Varadharajan Venkataramanan, "Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks," IEEE Internet Computing, Vol.9, pp.35-41, 2005.
13 Zuo Chen, Min He, Wei Liang, and Kai Chen, "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network," Journal of Sensors, vol.2015, pp. 1-10, 2015.
14 Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., "Wireless sensor networks: A survey," Comput. Netw, Vol.38, pp.393-422, 2002.   DOI
15 Yick, J., Mukherjee, B., Ghosal, D., "Wireless sensor network survey," Comput. Netw., vol.52, pp. 2292-2330, 2008.   DOI
16 H. Chan, A. Perrig, "Security and privacy in sensor networks," IEEE Computer, vol.36, no.10, pp.103-105, 2003.
17 Y.M. Huang, M.Y. Hsieh, H.C. Chao, S.H. Hung, J.H. Park, Pervasive, "Secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks," IEEE Journal on Selected Areas of Communications, vol. 27, no.4, pp.400-411, 2009.   DOI
18 S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1-37, May 2008.
19 G. Zhan, W. Shi, and J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Trans. Depend. Secure Comput., vol. 9, no. 2, pp. 184-197, Apr. 2012.   DOI
20 E. Aivaloglou and S. Gritzalis, "Hybrid trust and reputation management for sensor networks," Wireless Netw., vol. 16, no. 5, pp.1493-1510, Jul. 2010.   DOI
21 A.Rezgui andM. Eltoweissy, "${\mu}RACE$ : A reliable adaptive service driven efficient routing protocol suite for sensor-actuator networks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 5, pp. 607-622, May 2009.   DOI
22 S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Workshop Security of ad hoc and Sensor Networks (SASN'04), pp. 66-67, Oct. 2004.
23 Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Proc. of Third IEEE Int. Conf. Mobile Ad-Hoc and Sensor Systems (MASS'06), pp. 437-446, Oct. 2006.
24 R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, and S. Lee, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 11, pp.1698-1712, Nov. 2009.   DOI
25 F. Bao, I. Chen,M.Chang, and J. Cho, "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection," IEEE Trans. Netw. Service Manag., vol. 9, no. 2, pp. 169-183, Jun. 2012.   DOI