Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pr...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Inderscience Publishers
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/790/ http://irep.iium.edu.my/790/ http://irep.iium.edu.my/790/ http://irep.iium.edu.my/790/1/IJCNDS030205.pdf |
id |
iium-790 |
---|---|
recordtype |
eprints |
spelling |
iium-7902011-08-05T00:39:12Z http://irep.iium.edu.my/790/ Weakly connected dominating set-based secure clustering and operation in distributed sensor networks Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pre-distribution of secret keys to the participating sensors. Our approach uses the notion of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network for greater resource efficiency. The clusters in the network are formed in a secure and efficient way so that no hostile entity could be included in any cluster during network structuring process. We propose an efficient algorithm to form a network-wide secure WCDS, which includes an optional re-keying mechanism to increase the level of security. Our objective is to ensure security in distributed sensor network from the bootstrapping stage up to the beginning of its operation. Along with the description of our approach, we present detailed analysis, simulation results and comparisons of our approach with other related schemes. Inderscience Publishers 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/790/1/IJCNDS030205.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Weakly connected dominating set-based secure clustering and operation in distributed sensor networks. International Journal of Communication Networks and Distributed Systems, 3 (2). pp. 175-195. ISSN 1754-3924 (O), 1754-3916 (P) http://www.inderscience.com/browse/index.php?journalCODE=ijcnds DOI: 10.1504/IJCNDS.2009.026825 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
Q Science (General) QA76 Computer software |
spellingShingle |
Q Science (General) QA76 Computer software Pathan, Al-Sakib Khan Hong, Choong Seon Weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
description |
This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pre-distribution of secret keys to the participating sensors. Our approach uses the notion of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network for greater resource efficiency. The clusters in the network are formed in a secure and efficient way so that no hostile entity could be included in any cluster during network structuring process. We propose an efficient algorithm to form a network-wide secure WCDS, which includes an optional re-keying mechanism to increase the level of security. Our objective is to ensure security in distributed sensor network from the bootstrapping stage up to the beginning of its operation. Along with the description of our approach, we present detailed analysis, simulation results and comparisons of our approach with other related schemes. |
format |
Article |
author |
Pathan, Al-Sakib Khan Hong, Choong Seon |
author_facet |
Pathan, Al-Sakib Khan Hong, Choong Seon |
author_sort |
Pathan, Al-Sakib Khan |
title |
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
title_short |
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
title_full |
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
title_fullStr |
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
title_full_unstemmed |
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
title_sort |
weakly connected dominating set-based secure clustering and operation in distributed sensor networks |
publisher |
Inderscience Publishers |
publishDate |
2009 |
url |
http://irep.iium.edu.my/790/ http://irep.iium.edu.my/790/ http://irep.iium.edu.my/790/ http://irep.iium.edu.my/790/1/IJCNDS030205.pdf |
first_indexed |
2023-09-18T20:07:57Z |
last_indexed |
2023-09-18T20:07:57Z |
_version_ |
1777407284939325440 |