Weakly connected dominating set-based secure clustering and operation in distributed sensor networks

This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Format: Article
Language:English
Published: Inderscience Publishers 2009
Subjects:
Online Access:http://irep.iium.edu.my/790/1/IJCNDS030205.pdf
http://irep.iium.edu.my/790/
http://www.inderscience.com/browse/index.php?journalCODE=ijcnds
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.790
record_format dspace
spelling my.iium.irep.7902011-08-05T00:39:12Z http://irep.iium.edu.my/790/ Weakly connected dominating set-based secure clustering and operation in distributed sensor networks Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pre-distribution of secret keys to the participating sensors. Our approach uses the notion of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network for greater resource efficiency. The clusters in the network are formed in a secure and efficient way so that no hostile entity could be included in any cluster during network structuring process. We propose an efficient algorithm to form a network-wide secure WCDS, which includes an optional re-keying mechanism to increase the level of security. Our objective is to ensure security in distributed sensor network from the bootstrapping stage up to the beginning of its operation. Along with the description of our approach, we present detailed analysis, simulation results and comparisons of our approach with other related schemes. Inderscience Publishers 2009 Article REM application/pdf en http://irep.iium.edu.my/790/1/IJCNDS030205.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Weakly connected dominating set-based secure clustering and operation in distributed sensor networks. International Journal of Communication Networks and Distributed Systems, 3 (2). pp. 175-195. ISSN 1754-3924 (O), 1754-3916 (P) http://www.inderscience.com/browse/index.php?journalCODE=ijcnds DOI: 10.1504/IJCNDS.2009.026825
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic Q Science (General)
QA76 Computer software
spellingShingle Q Science (General)
QA76 Computer software
Pathan, Al-Sakib Khan
Hong, Choong Seon
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
description This paper presents an efficient approach to secure network formation in distributed sensor networks (DSNs), which could be used for secure communications among the nodes after the start of the network’s operation. The structure of the network is formed on the basis of offline rank assignments by pre-distribution of secret keys to the participating sensors. Our approach uses the notion of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network for greater resource efficiency. The clusters in the network are formed in a secure and efficient way so that no hostile entity could be included in any cluster during network structuring process. We propose an efficient algorithm to form a network-wide secure WCDS, which includes an optional re-keying mechanism to increase the level of security. Our objective is to ensure security in distributed sensor network from the bootstrapping stage up to the beginning of its operation. Along with the description of our approach, we present detailed analysis, simulation results and comparisons of our approach with other related schemes.
format Article
author Pathan, Al-Sakib Khan
Hong, Choong Seon
author_facet Pathan, Al-Sakib Khan
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
title Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_short Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_full Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_fullStr Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_full_unstemmed Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
title_sort weakly connected dominating set-based secure clustering and operation in distributed sensor networks
publisher Inderscience Publishers
publishDate 2009
url http://irep.iium.edu.my/790/1/IJCNDS030205.pdf
http://irep.iium.edu.my/790/
http://www.inderscience.com/browse/index.php?journalCODE=ijcnds
_version_ 1643604670295310336
score 13.15806