Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

In wireless sensor networks, sensing driven nature of data generation and uneven cluster sizes result in unbalanced data traffic load among clusters. Clusters in which the event generation rate is high and/or clusters that have more members than others suffer from congestion and data loss which negatively affect the accuracy of the collected data. In addition, the cluster heads of such clusters exhaust their energy earlier than others, thereby reducing the network lifetime. Hence, the data load among clusters must be balanced to preserve the data accuracy and prolog the network lifetime. This paper presents Secure Load Balancing (SLB) protocol and introduces pseudo-sinks in order to improve data accuracy and bandwidth utilization of wireless sensor networks while still providing secure communication. Simulation results show that, in comparison with traditional cluster based networks, SLB protocol improves the data accuracy and increases the data delivery rate in the presence of security constraints.

[1]  Halim Yanikomeroglu,et al.  Coverage enhancement through two-hop relaying in cellular radio systems , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[2]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[3]  Taieb Znati,et al.  Path key establishment using multiple secured paths in wireless sensor networks , 2005, CoNEXT '05.

[4]  Gustavo de Veciana,et al.  Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation , 2004, IEEE Journal on Selected Areas in Communications.

[5]  Ameer Ahmed Abbasi,et al.  A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..

[6]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[7]  H. Cam,et al.  ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).

[8]  Deborah Estrin,et al.  Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[9]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[10]  Chunming Qiao,et al.  Integrated cellular and ad hoc relay (iCAR) systems: pushing the performance limits of conventional wireless networks , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[11]  Dirk Timmermann,et al.  Minimal Transmission Power vs. Signal Strength as Distance Estimation for Localization in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[12]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[13]  Rahim Tafazolli,et al.  On the relaying capability of next-generation GSM cellular networks , 2001, IEEE Wirel. Commun..

[14]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[17]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[18]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[19]  Kamesh Munagala,et al.  Data-Driven Processing in Sensor Networks , 2007, CIDR.

[20]  Bhaskar Krishnamachari,et al.  Impact of heterogeneous deployment on lifetime sensing coverage in sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[21]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[22]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[23]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.