Secure Clustering Algorithm for Wireless Sensor Networks in the Perspective of Authentication
Etuk, Enobong E., S. Magesh "Secure Clustering Algorithm for Wireless Sensor Networks in the Perspective of Authentication". International Journal of Computer Trends and Technology (IJCTT) V27(1):14-20, September 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Authentication happens to be a fundamental security service in cluster based wireless sensor networks. This project will focus on designing a lightweight authentication scheme that will aim at achieving authentication of cluster members with cloud enabled cluster heads. This model also presents a hierarchical and on-demand cluster maintaining method in the clustered wireless sensor networks, ensuring that the network can identify and get rid of malicious nodes, achieve cluster-formation, selfmanagement and self-sustenance based on the random/parallel cluster header selection algorithm and a pre-distributed key scheme. This project will address secure mechanism on nodes joining in or quitting from network and a secure clustering algorithm based on the ant colony approach is proposed to make sure that mobile nodes joining in and quitting from network safely is based on authentication and secret telecommunications. An integrated solution is designed and developed to ensure efficient management, energy saving and information security for wireless sensor network, simulation results will show that the proposed model is promising in terms of networking security, efficiency and adaptability.
References
[1] Hu Xiangdong, Zhou Zhou, Jing Haixia and et al. ?Advance in security for wireless sensor network. Chinese Journal of Scientific Instrument,no.6,Supplement,2006.
[2] Heinzelman W R,Chandrakasan A,Balakrishnan H. ?An applicationspecific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, vol.1,no.4,660-670,2002.
[3] Younis O,Fahmy S. ?Distributed clustering in ad-hoc sensor networks:A hybrid,energy-efficient approach. In Proc.13th Joint Conf on IEEE Computer and Communications Societies,March 2004.
[4] S.Vasudevan,B.DeCleene,N.Immerman,and et al. ?Leader election algorithms for wireless ad hoc networks. In DARPA Information Survivability Conference and Exposition DISCEX,2006.
[5] Wang Xiao-yun,Yang Li-zhen,Chen Ke-fei. ?SLEACH: Secure lowenergy adaptive clustering hierarchy protocol for WSNs. Wuhan University Journal of Natural Sciences,vol.10,no.1, 127-131,2005.
[6] Hu Xiangdong,Wei Qinfang,Cui Ping and et al. ?Design and analysis of secure clustering of wireless sensor network. Control and Decision Conference, pp.1-3, 2008
[7] Jamil Ibriq,Imad Mahgoub. ?A Secure Hierarchical Routing Protocol for Wireless Sensor Networks. Communication systems,2006. 10th IEEE Singapore International Conference on Communication systems,pp.1-6,2006
[8] I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,andE.Cayirci,?AS urvey on Sensor Netowrks, IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, Aug 2002.
[9] S. Meyer and A. Rakotonirainy, ?A Survey of Research on ContextAware Homes, Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide Australia, 2003.
[10] B. Warneke, M. Last, B. Liebowitz, Kristofer, and S. Pister, ?Smart Dust: Communicating with a Cubic-Millimeter Computer, Computer Magazine, vol. 34, no. 1, pp. 44–51, Jan 2001.
[11] J. M. Kahn, R. H. Katz, and K. Pister, ?Next Century Challenges Mobile Networking for Smart Dust, 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Aug 1999.
[12] V. Hsu, M. Kahn, and K. S. J. Pister, ?Wireless Communication for Smart Dust, Electronic Research Laboratory Technical Memorandum, Feb 1998
[13] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, ?Energy EfficientCommunicationProtocolforWirelessMicroSensorNet works, Proceedings of IEEE HICSS, Jan 2000.
[14] C. F. Chiasserini, I. Chlamtac, P. Monti, and A. Nucci, ?Energy Efficient Design of Wireless Ad Hoc Networks, Proceedings of European Wireless, Feb 2002.
[15] S. Bandyopadhyay and E. J. Coyle, ?An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks, IEEE INFOCOM, April 2003.
[16] D. J. Baker and A. Epheremides, ?The Architectural Organization of a Moblie Radio Network via a Distributed Algorithm, IEEE Transactions on Communications, vol. Com-29, no. 11, November 1981.
[17] P. Tsigas, ?Project on Moblie Ad Hoc Networking and Clustering for the Course EDA390 Computer Communcation and Distributed Systems, Manual for University Course.
[18] A. Amis, R. Prakash, T. Vuong, and D. Huynh, ?Max-Min D-Cluster Formation in Wireless Ad Hoc Networks, IEEE INFOCOM, March 2000.
[19] C.E.Nishimura and D.M.Conlon, ?IUSS dual use: Monitoring of whales and earthquakes using SOSUS, Mar. Technol. Soc. J., vol. 27, no. 4, 1994.
[20] A. Mainwaring et al., ?Wireless Sensor Networks for Habitat Monitoring, Proceedings of the 1st ACM International Workshop on WSN, 2002.
[21] C.Y.Chong, S.Mori, and K.C.Chang, ?Distributed multitarget multisensor tracking, in Multitarget Multisensor Tracking:Advanced Applications, 1990.
[22] C. Intanagonwiwat et al., ?Directed Diffusion for Wireless Sensor Networking, IEEE/ACM Transaction on Networking, vol. 11, no. 1, Feb. 2003.
[23] Priti Kumari ?Clustering Algorithm in Wireless Sensor Network: A Survey, Institute of Research Engineers and Doctors.
Keywords
wireless sensor networks, Authentication, cloud, node joining in and quitting from network; security; clustering; mechanism.