Secure communications over insecure channels
Communications of the ACM
GS3: scalable self-configuration and self-healing in wireless networks
Proceedings of the twenty-first annual symposium on Principles of distributed computing
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Localized Protocols for Ad Hoc Clustering and Backbone Formation: A Performance Comparison
IEEE Transactions on Parallel and Distributed Systems
Fault-Tolerant Clustering in Ad Hoc and Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Secure Distributed Cluster Formation in Wireless Sensor Networks
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
ICWMC '07 Proceedings of the Third International Conference on Wireless and Mobile Communications
Sensor network security: more interesting than you think
HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
Resilient Cluster Formation for Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
SecLEACH-On the security of clustered sensor networks
Signal Processing
A survey on clustering algorithms for wireless sensor networks
Computer Communications
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Resilient cluster leader election for wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Energy-efficient distributed clustering in wireless sensor networks
Journal of Parallel and Distributed Computing
Mires++: a reliable, energy-aware clustering algorithm for wireless sensor networks
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks
IFITA '10 Proceedings of the 2010 International Forum on Information Technology and Applications - Volume 01
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
SecDEACH: secure and resilient dynamic clustering protocol preserving data privacy in WSNs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Securing wireless sensor networks: a survey
IEEE Communications Surveys & Tutorials
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Node clustering in wireless sensor networks: recent developments and deployment challenges
IEEE Network: The Magazine of Global Internetworking
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable clustering, which is critical in WSNs deployed in hostile environments, has gained modest attention so far or has been limited only to fault tolerance. In this paper, we review the state-of-the-art of clustering protocols in WSNs with special emphasis on security and reliability issues. First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols. Finally, we propose countermeasures against typical attacks and show how they improve the discussed protocols.