A Security Strategy Based on Two-Dimension Location for Hierarchical Wireless Heterogeneous Sensor Networks

被引:0
|
作者
Zhang, Yuquan [1 ,2 ]
Wei, Lei [3 ]
机构
[1] Shandong Women Univ, Jinan, Shandong, Peoples R China
[2] Qilu Normal Univ, Wireless Sensing Inst, Coll Informat Sci & Engn, Jinan, Shandong, Peoples R China
[3] Qilu Normal Univ, Coll Phys & Elect Engn, Jinan, Shandong, Peoples R China
关键词
Hierarchical wireless heterogeneous sensor network; two-layer; two-dimension; security; connectivity; lifetime;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cluster-based secure strategy for hierarchical wireless heterogeneous sensor networks(HWHSNs) is proposed. The HWHSNs consist of some normal sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other normal nodes. Their structure is a two-layer structure. The upper layer consists of all cluster heads, namely heterogeneous sensor nodes, and the lower layer consists of all normal sensors managed by their corresponding cluster heads. All kinds of sensor nodes are evenly distributed respectively in entire sensing area. The two-dimension sensing area is divided into a number of clusters, each of which contains four small squares called cells. The pairwise keys between all kinds of nodes are set up through employing the concept of the overlap key sharing and the random key pre-distribution scheme. Analysis and comparison show this scheme improves the security for HWHSNs, enhances the connectivity for HWHSNs, and prolongs the lifetime of HWHSNs by employing some heterogeneous nodes.
引用
收藏
页码:420 / 425
页数:6
相关论文
共 50 条
  • [41] A Cluster-Based Mitigation Strategy Against Security Attacks in Wireless Sensor Networks
    Khan, Jahangir
    Shah, Ansar Munir
    Nawaz, Babar
    Mahmood, Khalid
    Saeed, Muhammad Kashif
    ul Hassan, Mehmood
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 409 - 414
  • [42] Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks
    Vorugunti, Chandra Sekhar
    Mishra, Bharavi
    Amin, Ruhul
    Badoni, Rakesh P.
    Sarvabhatla, Mrudula
    Mishra, Dheerendra
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 3141 - 3166
  • [43] Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks
    Chandra Sekhar Vorugunti
    Bharavi Mishra
    Ruhul Amin
    Rakesh P. Badoni
    Mrudula Sarvabhatla
    Dheerendra Mishra
    [J]. Wireless Personal Communications, 2017, 95 : 3141 - 3166
  • [44] Efficient Sequential-Hierarchical Deployment Strategy for Heterogeneous Sensor Networks
    de Groot, Teun H.
    Krasnov, Oleg A.
    Yarovoy, Alexander
    [J]. 2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [45] Two security layers for hierarchical data aggregation in sensor networks
    [J]. Makhoul, Abdallah, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07):
  • [46] Two Layered Hierarchical Model for Cognitive Wireless Sensor Networks
    Kumar, K. Vinod
    Phani, G. Lakshmi
    Sayeesh, K. Venkat
    Chaganty, Aparna
    Murthy, G. Rama
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 19 - +
  • [47] Resource scheduling strategy in hierarchical software defined wireless sensor networks
    Zhen Y.
    Zhao H.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 87 - 98
  • [48] A Novel Hierarchical Two-Tier Node-Deployment Strategy for Sustainable Wireless Sensor Networks
    Zomaya, Albert Y.
    [J]. COMPUTER, 2019, 52 (03) : 4 - 5
  • [49] Security for Wireless Sensor Networks
    Wang, Yilin
    Qin, Maosheng
    [J]. INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 844 - 848
  • [50] Security in Wireless Sensor Networks
    Obaidat, Mohammed S.
    Nicopolitidis, Petros
    Li, Jung-Shian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 101 - 103