SPINS: security protocols for sensor networks
Wireless Networks
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
SecLEACH-On the security of clustered sensor networks
Signal Processing
Resilient cluster leader election for wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Energy-efficient distance based clustering routing scheme for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
IEEE Communications Magazine
Node clustering in wireless sensor networks: recent developments and deployment challenges
IEEE Network: The Magazine of Global Internetworking
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Clustering scheme enabling the efficient utilization of the limited energy resources of the deployed sensor nodes can effectively prolong lifetime of wireless sensor networks. Like most of the protocols for wireless sensor networks, a clustering scheme is vulnerable to a number of security attacks. Especially, attacks involving cluster-heads are the most damaging since cluster-based schemes rely on their cluster-heads for routing and data aggregation. Several studies have proposed a secure clustering scheme and a resilient cluster leader election protocol in wireless sensor networks. However, most of resilient clustering schemes do not support dynamic clustering and most of secure clustering schemes are not robust and resilient against node(specially, cluster-heads) capture. In this paper, we present a secure and resilient clustering protocol on the basis of dynamic clustering protocol. Our scheme provides both a secure clustering and a resilient cluster-head election preserving dynamic clustering unlike the existing secure clustering schemes. In addition, our scheme provides data privacy through the concealed data aggregation. The analysis shows that our scheme offers the security services against both an inside attack and an outside attack while having the little memory, computation and communication overheads. The comparison with related works shows that our scheme has a great improvement in security and the reduction of the overheads compared to the existing schemes.