2012
DOI: 10.1155/2012/301750
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Cluster Formation Scheme in Wireless Sensor Networks

Abstract: In wireless sensor networks, clustering expedites many desirable functions such as load balancing, energy savings, and distributed key management. For secure clustering, it is very important to find compromised nodes and remove them during the initial cluster formation process. If some nodes are compromised and survive the censorship process, they can make some nodes have a different cluster view and can split a cluster into multiple clusters to deteriorate cluster quality as a whole. To resolve these problems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…The energy is consumed in a node while transmitting and receiving the packets. All sensor nodes are grouped into clusters based [8] on the distance between the nodes and energy of each node in the network. In our proposed system highest energy nodes will be considered as cluster heads (CH).…”
Section: Network Formationmentioning
confidence: 99%
“…The energy is consumed in a node while transmitting and receiving the packets. All sensor nodes are grouped into clusters based [8] on the distance between the nodes and energy of each node in the network. In our proposed system highest energy nodes will be considered as cluster heads (CH).…”
Section: Network Formationmentioning
confidence: 99%
“…In this paper, we only focus on those steps after the secure cluster formation. Please refer to [1], [7], [8] concerning the secure cluster formation. In the candidate reselection step, nodes pick up behaving nodes among all members in their cluster.…”
Section: A Network Modelmentioning
confidence: 99%
“…Some cluster formation protocols [1], [7], [8] can be employed for that purpose. We also assume that all pairs of members in a cluster have established a pairwise key with each other.…”
Section: Securing Cluster Head Elections Using Reselection Of Canmentioning
confidence: 99%
See 2 more Smart Citations