A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks

Security is the utmost importance for the safe operation of the Internet of Things (IoT) devices. Behind IoT, a sensor network operates. Hence, security and lifetime extensions of the sensor networks are the primary concern. Node clustering is a technique to lengthen the lifetime of sensor networks. In a clustering technique, Cluster Heads (CH) are chosen. To provide the security to the sensor network, reliable CHs are elected. In this article, a protocol is proposed which elects reliable CHs based on node features such as residual energy, distance to the sink and node behavior such as the number of packets transmitted and received successfully, data consistency factor. The simulation results obtained prove that the proposed protocol performs better.

[1]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[2]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[3]  Gicheol Wang,et al.  Clustering-Based Key Renewals for Wireless Sensor Networks , 2009, IEICE Trans. Commun..

[4]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[5]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[6]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[7]  Mohamed Younis,et al.  Performance evaluation of load-balanced clustering of wireless sensor networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[8]  Peng Ning,et al.  Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[9]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[10]  Lotfi A. Zadeh,et al.  Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..

[11]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[12]  Sanjeev J. Wagh,et al.  Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust , 2018, Cluster Computing.

[13]  Gicheol Wang,et al.  A Secure Cluster Formation Scheme in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.