Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
Summary The use of wireless sensor networks (WSNs) has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect clustered network against denial of service attacks with the use of traffic monitoring agents on some nodes. Those control nodes have to analyze the traffic inside a cluster and to send warnings to the cluster head whenever an abnormal behavior (e.g., high packets throughput or non‐retransmission of packets) is detected. But if the control nodes (cNodes) die out of exhaustion, they leave the network unprotected. To better fight against attacks, we try to enhance this solution by renewing periodically the election process. Furthermore, we propose three energy‐aware and secure methods to designate the cNodes in a hierarchically clustered WSN. The first one is a simple self‐election process where nodes randomly designate themselves. It leads to a better load balancing than a static method (i.e., with no renewal), but we argue that we can obtain better results by considering the remaining energy of the nodes at cNodes selection time. Hence, the second algorithm is purely based on the residual energy of the sensors. We discuss limitations of this deterministic process concerning security and cluster coverage and suggest workarounds. These improvements lead us to the third mechanism. It is based on residual energy too, but it includes a democratic election process in which nodes in the cluster vote to optimize the cNode role attribution. Results obtained from simulation experiments with the ns‐2 tool are provided to analyze the energy repartition in the network and to compare the three selection algorithms. All experimental outcomes show improvements of the load balancing in the network, while maintaining good detection coverage, in regard to static selection. Furthermore, the analysis of the respective performances of the three mechanisms is used as a basis to establish recommendations regarding the use cases of those methods. Copyright © 2017 John Wiley & Sons, Ltd.
Summary The use of wireless sensor networks (WSNs) has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect clustered network against denial of service attacks with the use of traffic monitoring agents on some nodes. Those control nodes have to analyze the traffic inside a cluster and to send warnings to the cluster head whenever an abnormal behavior (e.g., high packets throughput or non‐retransmission of packets) is detected. But if the control nodes (cNodes) die out of exhaustion, they leave the network unprotected. To better fight against attacks, we try to enhance this solution by renewing periodically the election process. Furthermore, we propose three energy‐aware and secure methods to designate the cNodes in a hierarchically clustered WSN. The first one is a simple self‐election process where nodes randomly designate themselves. It leads to a better load balancing than a static method (i.e., with no renewal), but we argue that we can obtain better results by considering the remaining energy of the nodes at cNodes selection time. Hence, the second algorithm is purely based on the residual energy of the sensors. We discuss limitations of this deterministic process concerning security and cluster coverage and suggest workarounds. These improvements lead us to the third mechanism. It is based on residual energy too, but it includes a democratic election process in which nodes in the cluster vote to optimize the cNode role attribution. Results obtained from simulation experiments with the ns‐2 tool are provided to analyze the energy repartition in the network and to compare the three selection algorithms. All experimental outcomes show improvements of the load balancing in the network, while maintaining good detection coverage, in regard to static selection. Furthermore, the analysis of the respective performances of the three mechanisms is used as a basis to establish recommendations regarding the use cases of those methods. Copyright © 2017 John Wiley & Sons, Ltd.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.