Browse > Article

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks  

Cheon, EunHong (우석대학교/컴퓨터공학과)
Lee, YonSik (군산대학교/컴퓨터정보공학과)
Publication Information
Abstract
The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.
Keywords
wireless sensor network; key management; distributed clustering; authenticity; energy efficient routing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Parno, A. Perrig, and V. Gligor. "Distributed detection of node replication attacks in sensor networks," IEEE Symposium on Security and Privacy, pp. 1-5, 2009.
2 Younis, O. and Fahmi, S. "Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Transactions on Mobile Computing, Vol. 3, No. 4 pp. 366-379, 2004.   DOI
3 Lalita Yadav et al, "Low Energy Adaptive Clustering with Deterministic Cluster Head Selection," International Journal of Computer Science and Information Technologies, Vol. 5, No. 3, pp. 4661-4664, 2014.
4 Aslam, M. Javaid, N. Rahim, A. Nazir, "Survey of Extended LEACH-Based Clustering Routing Protocols for Wireless Sensor Networks," IEEE Conference on Embedded Software and Systems, pp. 1232-1238, 2012.
5 S. P. Barfunga, P. Rai, and H. K. Sarma, "Energy efficient cluster based routing protocol for wireless sensor network," IEEE Conferences on Computer and Communication Engineering, pp. 603-607, July. 2012.
6 W. Gu, S. Chellappan, X. Bai, and H. Wang, "Scaling laws of key pre-distribution protocols in wireless sensor networks," Information Forensics and Security, IEEE Transactions on, Vol. 6, No. 4, pp. 1370-1381, 2011.   DOI
7 L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 41-47, 2002.
8 H. M. Sun, M. E. Wu, M Jason Hinek, C. T. Yang and V. S. Tseng, "A pairwise key establishment for wireless sensor networks," Journal of Systems and Software, Vol. 82, No. 9, pp. 1503-1512, 2009.   DOI
9 C. Dhivya Devi et al. "study on security protocol in wireless sensor networks," International Journal of Engineering and Technology, Vol. 5, No. 1, 2013.
10 C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and Countermeasures," IEEE International Workshop on Sensor Network Protocols and Applications, pp.293-315, 2003.
11 Raed M. Bani Hani and Abdalraheem A. Ijjeh, "A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks," Journal of Communications, Vol 8, No 3, pp. 192-206, 2013.   DOI