Providing security and energy efficiency in wireless ad-hoc sensor networks through Secure Cluster-Head Election (SEC-CH-E)

Data sensed and transferred between sensor nodes should be secure and preserve battery life. Some algorithms, such as LEACH (Low Energy Adaptive Clustering Hierarchy), have been proposed to efficiently organize sensor nodes into clusters, where a cluster-head, is elected to represent that cluster. To save energy, the cluster-head coordinates the cluster and forwards data generated within the cluster. Despite preserving energy, in practice LEACH lacks security features. A Secure Cluster Head Election algorithm (SEC-CH-E) that improves the original LEACH algorithm by adding security features as well as bringing increasing energy savings is proposed. The algorithm takes into account wireless sensor networks constraints such as the limited radio range and power limitations when electing secure cluster-head nodes, which are factors unaccounted for in LEACH. It is shown that these factors have profound energy implications. The superiority of Sec-CH-E performance is assessed by looking at the energy remaining in the network and the fraction of dead nodes.

[1]  D. H. Smithgall,et al.  Toward the 60 gm wireless phone , 1998, Proceedings RAWCON 98. 1998 IEEE Radio and Wireless Conference (Cat. No.98EX194).

[2]  K. J. Ray Liu,et al.  Software radio architecture with smart antennas: a tutorial on algorithms and complexity , 1999, IEEE J. Sel. Areas Commun..

[3]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[4]  Gregory J. Pottie,et al.  Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[6]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[7]  Sencun Zhu,et al.  LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.

[8]  Edward J. Coyle,et al.  An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  Murat Demirbas,et al.  Peer-to-peer spatial queries in sensor networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[10]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[11]  Adrian Perrig,et al.  ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.

[12]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[13]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[14]  Indranil Gupta,et al.  Cluster-head election using fuzzy logic for wireless sensor networks , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).

[15]  Mimoza Durresi,et al.  Clustering protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[16]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[17]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[18]  Leonard Barolli,et al.  Clustering Protocol for Sensor Networks , 2006, AINA.

[19]  Younghyun Kim,et al.  Hierarchical Node Clustering Approach for Energy Savings in WSNs , 2007, 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007).

[20]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[21]  Soumendra Nath Lahiri,et al.  Security and performance analysis of a secure clustering protocol for sensor networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[22]  Masayuki Murata,et al.  On Characteristics of Multi-Hop Communication in Large-Scale Clustered Sensor Networks , 2007, IEICE Trans. Commun..

[23]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[24]  Ahmed Bouridane,et al.  Improving Key Distribution forWireless Sensor Networks , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[25]  Ahmed Bouridane,et al.  A Power Efficient Path Key Establishment Algorithm for Wireless Sensor Networks , 2008, 2008 NASA/ESA Conference on Adaptive Hardware and Systems.