A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware

It is a key problem for reducing the network energy consumption and improving energy utilization of sensor nodes, due to the limited energy of sensor nodes. Because of open, distributed and self-organization characteristics of WSNs, it is vulnerable to the threat of energy in the network topology construction and communication process, but traditional methods which assume the sensor nodes to be credible were unable to cope with the energy attacks. Based on this, this paper proposes a security topology protocol of wireless sensor network named as CDEA according to community detection and energy aware. The method uses complex network community division algorithm for detecting the similar energy behaviour nodes in the neighbourhood of these nodes, and elects the cluster head according to energy, credibility and the distance to the base station, and carries on the choice of the next hop node accessing based on the principle of the immune response and finally gets low power consumption secure topological structure. The experimental results shows that the CDEA not only can reduce and balance the network energy, but also prolong the survival time of the system, and resist the energy attack at the same time.

[1]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[2]  Fei Du,et al.  An Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Haiyun Luo,et al.  A two-tier data dissemination model for large-scale wireless sensor networks , 2002, MobiCom '02.

[4]  Mohamed Eltoweissy,et al.  TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[5]  Zeng Peng,et al.  Research on Security System of Wireless Sensor Network Based on Biological Immunity Principle , 2005 .

[6]  Andrea Lancichinetti,et al.  Detecting the overlapping and hierarchical community structure in complex networks , 2008, 0802.1218.

[7]  Tao Liu,et al.  Power-Efficient Clustering Routing Protocol Based on Applications in Wireless Sensor Network , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Edward J. Coyle,et al.  Minimizing communication costs in hierarchically clustered networks of wireless sensors , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[9]  Yookun Cho,et al.  PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks , 2007, Comput. Commun..

[10]  Jean-Loup Guillaume,et al.  Fast unfolding of community hierarchies in large networks , 2008, ArXiv.

[11]  Cao Xiao DoS Attack Detection Scheme for Sensor Networks Based on Traffic Prediction , 2007 .

[12]  Jie Wu,et al.  EECS: an energy efficient clustering scheme in wireless sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[13]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[14]  Cai Cheng-wen Energy-Balanced Adaptive Clustering Algorithm in Wireless Sensor Networks , 2007 .

[15]  Steve Gregory,et al.  A Fast Algorithm to Find Overlapping Communities in Networks , 2008, ECML/PKDD.

[16]  Petter Holme,et al.  Subnetwork hierarchies of biochemical pathways , 2002, Bioinform..

[17]  Edward J. Coyle,et al.  Minimizing communication costs in hierarchically-clustered networks of wireless sensors , 2004, Comput. Networks.

[18]  M. Newman,et al.  Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  Apeksha V. Sakhare,et al.  Routing in Wireless Sensor Network Using Fuzzy Based Trust Model , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[20]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[21]  Zheng Bao-yu Sensor Selection Algorithm Based on Reputation in Wireless Sensor Network , 2008 .

[22]  Rajesh Krishnan,et al.  Efficient clustering algorithms for self-organizing wireless sensor networks , 2006, Ad Hoc Networks.

[23]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.