Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks

被引:3
|
作者
Su, Tung-Shih [1 ]
Huang, Mei-Wen [2 ]
Li, Wei-Shou [3 ]
Hsieh, Wen-Shyong [2 ,3 ]
机构
[1] Fortune Inst Technol, Dept Informat Management, Daliao Township 831, Kaohsiung Count, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[3] SHU TE Univ, Dept Comp Sci & Informat Engn, Kaohsiung 82445, Taiwan
关键词
ENERGY-EFFICIENT FRAMEWORK; MAXIMUM LIFETIME; ALGORITHM; PROTOCOL;
D O I
10.1155/2012/162347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a large-scale wireless sensor network, a topology is needed to gather state-based data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal energy consumption, and prolonged network lifetime. In this study, we proposed a ring-based hierarchical clustering scheme (RHC) consisting of four phases: predeployment, parent-child relationship building, deployment, and member join phases. Two node types are distributed throughout the network: cluster head nodes (type 1 node) and general sensor nodes (type 2 node). The type 1 node has better battery life, software capability, and hardware features than the type 2 node; therefore, the type 1 node is a better cluster head than type 2 node. Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks
    Messai, Mohamed-Lamine
    Seba, Hamida
    Aliouat, Makhlouf
    [J]. WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2015, 2015, 9071 : 411 - 424
  • [2] An ultra hierarchical clustering-based secure aggregation protocol for wireless sensor networks
    Faye S.
    Myoupo J.F.
    [J]. Advances in Information Sciences and Service Sciences, 2011, 3 (09): : 309 - 319
  • [3] A secure data aggregation scheme for wireless sensor networks
    Ren, Shu Qin
    Kim, Dong Seong
    Park, Jong Sou
    [J]. FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 32 - +
  • [4] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [5] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52
  • [6] Secure Data Aggregation Scheme in Wireless Sensor Networks for IoT
    Alghamdi, Ahmed
    Alshamrani, Mesfar
    Alqahtani, Abdullah
    Al Ghamdi, Sultan Safar A.
    Harrathi, Rami
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [7] Mutual Defense Scheme for Secure Data Aggregation in Wireless Sensor Networks
    Hu Rong-hua
    Dong Xiao-mei
    Wang Da-ling
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [8] Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks
    Roopa, S. Nithya
    Anandababu, P.
    Amaran, Sibi
    Verma, Rajesh
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 497 - 512
  • [9] An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks
    孟金涛
    苑建蕊
    冯圣中
    魏彦杰
    [J]. Journal of Computer Science & Technology, 2013, 28 (03) : 564 - 573
  • [10] An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks
    Meng, Jin-Tao
    Yuan, Jian-Rui
    Feng, Sheng-Zhong
    Wei, Yan-Jie
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (03) : 564 - 573