Weakly connected dominating set-based secure clustering and operation in distributed sensor networks

This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pr...

Full description

Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Format: Article
Language:English
Published: Inderscience Publishers 2009
Subjects:
Online Access:http://irep.iium.edu.my/790/
http://irep.iium.edu.my/790/
http://irep.iium.edu.my/790/
http://irep.iium.edu.my/790/1/IJCNDS030205.pdf
id iium-790
recordtype eprints
spelling iium-7902011-08-05T00:39:12Z http://irep.iium.edu.my/790/ Weakly connected dominating set-based secure clustering and operation in distributed sensor networks Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pre-distribution of secret keys to the participating sensors. Our approach uses the notion of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network for greater resource efficiency. The clusters in the network are formed in a secure and efficient way so that no hostile entity could be included in any cluster during network structuring process. We propose an efficient algorithm to form a network-wide secure WCDS, which includes an optional re-keying mechanism to increase the level of security. Our objective is to ensure security in distributed sensor network from the bootstrapping stage up to the beginning of its operation. Along with the description of our approach, we present detailed analysis, simulation results and comparisons of our approach with other related schemes. Inderscience Publishers 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/790/1/IJCNDS030205.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Weakly connected dominating set-based secure clustering and operation in distributed sensor networks. International Journal of Communication Networks and Distributed Systems, 3 (2). pp. 175-195. ISSN 1754-3924 (O), 1754-3916 (P) http://www.inderscience.com/browse/index.php?journalCODE=ijcnds DOI: 10.1504/IJCNDS.2009.026825
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic Q Science (General)
QA76 Computer software
spellingShingle Q Science (General)
QA76 Computer software
Pathan, Al-Sakib Khan
Hong, Choong Seon
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
description This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pre-distribution of secret keys to the participating sensors. Our approach uses the notion of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network for greater resource efficiency. The clusters in the network are formed in a secure and efficient way so that no hostile entity could be included in any cluster during network structuring process. We propose an efficient algorithm to form a network-wide secure WCDS, which includes an optional re-keying mechanism to increase the level of security. Our objective is to ensure security in distributed sensor network from the bootstrapping stage up to the beginning of its operation. Along with the description of our approach, we present detailed analysis, simulation results and comparisons of our approach with other related schemes.
format Article
author Pathan, Al-Sakib Khan
Hong, Choong Seon
author_facet Pathan, Al-Sakib Khan
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
title Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_short Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_full Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_fullStr Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_full_unstemmed Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_sort weakly connected dominating set-based secure clustering and operation in distributed sensor networks
publisher Inderscience Publishers
publishDate 2009
url http://irep.iium.edu.my/790/
http://irep.iium.edu.my/790/
http://irep.iium.edu.my/790/
http://irep.iium.edu.my/790/1/IJCNDS030205.pdf
first_indexed 2023-09-18T20:07:57Z
last_indexed 2023-09-18T20:07:57Z
_version_ 1777407284939325440