Results 1 -
6 of
6
( Secure Cluster Head Elections Based on Trust for Wireless Sensor Networks)
"... In clustered sensor networks, since a CH (Cluster Head) collects data from its members and delivers the collected data to the sink, it is very important to prevent compromised nodes from joining a CH election and manipulating and fabricating the election result. In order to protect CH elections from ..."
Abstract
- Add to MetaCart
In clustered sensor networks, since a CH (Cluster Head) collects data from its members and delivers the collected data to the sink, it is very important to prevent compromised nodes from joining a CH election and manipulating and fabricating the election result. In order to protect CH elections from compromised nodes, unpredictability, non-manipulability, and agreement property should be guaranteed in CH elections. However, existing CH election schemes cannot prevent intelligent compromised nodes from skilfully violating those properties via their cooperation. In this paper, we propose a scheme which protects the CH election process by detecting intelligent compromised nodes and excluding them. For every CH election round, each member gives a direct trust value to other members according to their behavior. Then a real reputation value is given to each member by combining the direct trust value and indirect trust values provided by other members. Then, each node evaluates the real reputation values of members in its cluster and excludes some untrustable nodes from CH candidates. The scheme greatly improves the non-manipulability and agreement property of CH election results compared to other rival schemes. Furthermore, the scheme preserves the high non-manipulability
2013 The Society for Modeling and Simulation International
"... sim.sagepub.com Reputation-based cluster head elections in wireless sensor networks ..."
Abstract
- Add to MetaCart
sim.sagepub.com Reputation-based cluster head elections in wireless sensor networks
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
"... ABSTRACT ..."
(Show Context)
1 Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
"... Abstract—In mission critical cyber-physical systems, dependability is an important requirement at all layers of the system architecture. In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyberphysical syst ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In mission critical cyber-physical systems, dependability is an important requirement at all layers of the system architecture. In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyberphysical systems. More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. Our advanced protocols resist strong adversaries that can physically compromise some nodes. 1
Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey
"... In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable ..."
Abstract
- Add to MetaCart
(Show Context)
In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable clustering, which is critical in WSNs deployed in hostile environments, has gained modest attention so far or has been limited only to fault tolerance. In this paper, we reviewthestate-of-the-artofclusteringprotocolsinWSNswithspecialemphasis on security and reliability issues. First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols. Finally, we propose countermeasures against typical attacks and show how they improve the discussed protocols.
Secure based Clustering Algorithm for Wireless Sensor Networks
"... Protecting the data from intruders and increasing the network lifetime is a major constraint in Wireless Sensor Network. The lifetime of the network is determined by the amount of energy consumed by each node. In order to increase the network lifetime and protect the data, the security based cluster ..."
Abstract
- Add to MetaCart
(Show Context)
Protecting the data from intruders and increasing the network lifetime is a major constraint in Wireless Sensor Network. The lifetime of the network is determined by the amount of energy consumed by each node. In order to increase the network lifetime and protect the data, the security based clustering algorithm is proposed. It construct the clusters to reduce the energy consumption among the sensor nodes in which the cluster head collects and aggregate the data from the cluster members. A special node MDC collects and aggregates the data from cluster head and forwards them to Base station. The data are protected from intruders by authenticates the Cluster head by MDC using the shared secret key and the Digital Signature. The simulation results prove that our algorithm is more efficiently secure the data and achieves more energy