Reliable data delivery in wireless sensor networks using distributed cluster monitoring

In a clustering-based Wireless Sensor Network (WSN), cluster heads play an important role by serving as data forwarders amongst other network organisation functions. Thus, malfunctioning and/or compromised sensor nodes that serve as Cluster Head (CH) can lead to unreliable data delivery. In this paper, we propose a scheme (called Secure Low Energy Clustering (SecLEC)) that incorporates secure cluster head selection and distributed cluster head monitoring to achieve reliable data delivery. The SecLEC framework is flexible and can accommodate various tracking and monitoring mechanisms. Our goal in this paper is to understand the performance impact of adding such security mechanisms to the clustering architecture in terms of energy consumed and prevented data losses. Our experiments show that with SecLEC, BS detects such anomalous nodes with the latency of one network operation round and the data loss due to malicious nodes is up to 0.5% with a reasonable communication overhead.

[1]  Miodrag Potkonjak,et al.  Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments , 2001, MobiCom '01.

[2]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[7]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[8]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[9]  Ramesh Govindan,et al.  Wireless sensor networks , 2003, Comput. Networks.

[10]  Deborah Estrin,et al.  Localization in sensor networks , 2004 .

[11]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[12]  Krishna M. Sivalingam,et al.  A multi-layered architecture and protocols for large-scale wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[13]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[14]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[15]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[17]  Krishna M. Sivalingam,et al.  A survey of MAC protocols for sensor networks , 2004 .

[18]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[19]  Anupam Joshi,et al.  Security for wireless sensor networks , 2004 .

[20]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[21]  Bo Li,et al.  Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks , 2006, Ad Hoc Sens. Wirel. Networks.