scholarly journals A Secure Cluster Formation Scheme in Wireless Sensor Networks

2012 ◽  
Vol 8 (10) ◽  
pp. 301750 ◽  
Author(s):  
Gicheol Wang ◽  
Dongkyun Kim ◽  
Gihwan Cho

In wireless sensor networks, clustering expedites many desirable functions such as load balancing, energy savings, and distributed key management. For secure clustering, it is very important to find compromised nodes and remove them during the initial cluster formation process. If some nodes are compromised and survive the censorship process, they can make some nodes have a different cluster view and can split a cluster into multiple clusters to deteriorate cluster quality as a whole. To resolve these problems, we propose a robust scheme against such attacks in this paper. First, our scheme generates large-sized clusters where any two nodes are at most two hops away from each other to raise the quality of clusters. Second, our scheme employs the verification of two-hop distant nodes to preserve the quality of the large-sized clusters and refrains from splitting the clusters. Last, our scheme prefers broadcast transmissions to save the energy of nodes. Security analysis proves that our scheme can identify compromised nodes and preserves the cluster membership agreement against the compromised nodes. In addition, simulation results prove that our scheme generates fewer clusters and is more secure and energy efficient than the scheme producing only small-sized clusters.

2012 ◽  
Vol 482-484 ◽  
pp. 252-255
Author(s):  
Xi Yuan Ma ◽  
Shu Mei Fan ◽  
Myong Soon Park

Wireless Sensor Networks (WSNs) are usually subjected to numerous threats and vulnerable to various attacks. Generally, the key management is considered to be the prerequisite for secure communication in WSNs. In this paper, we present a Localization-based Clustered Key Management (LCKM) which can efficiently enhance the network security and survivability for the clustered heterogeneous networks. LCKM utilizes the seeds to rekey and then localize the key materials, which protects the network from the compromised nodes by reducing the probability of the common key. The security analysis proves that LCKM can prevent more attacks than other protocols.


Author(s):  
Vivaksha Jariwala ◽  
Himanshu Patel ◽  
Parth Patel ◽  
Devesh C. Jinwala

Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is based on a zero configuration protocol that supports a generation of a defined aggregation topology and a key exchange procedure. This work supports the framework with detailed security analysis and performance evaluation on TinyOS platform using TOSSIM as the base simulator. Through humble observations, this is an unique attempt that integrates the support for security features, topology generation and key management in a single, secure data aggregation protocol; substantiating the proposal with elaborate experimental evaluation, too.


2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Sign in / Sign up

Export Citation Format

Share Document