Self-configuring Node Clusters, Data Aggregation, and Security in Microsensor Networks
نویسندگان
چکیده
Microsensors operate under severe energy constraints and should be deployed in large numbers without any pre-configuration. We construct a generalized self-clustering algorithm, called Low-energy Localized Clustering (LLC). It integrates the ideas of two self-configuring clustering algorithms: the Localized algorithm and the Low Energy Adaptive Clustering Hierarchy algorithm. LLC covers a range of behaviors from the better-clustering performance of the Localized method to the energy-efficient operation of the LEACH method. The main advantage of LLC is that it can be energy-efficient while maintaining localization. Data aggregation techniques such as summarization, finding representative data items, and pattern matching are proposed. Data aggregation is a necessity in microsensor networks, since transmitting huge volumes of raw data is an energy-intensive operation. Finally, security issues are discussed and an energyefficient Randomized Data Authentication algorithm is designed specifically for microsensor applications.
منابع مشابه
Self-Configuring Clusters, Data Aggregation and Authentication in Microsensor Networks
Microsel1sors operate under severe energy cOllstraints a'nd should be deployed in large numbers Wilhou! any pre-col/figuration. The maill contribution of this paper is a generalized selfclustering protocol, called Low-energy Localized Clustering (LLC).lt iucorporates the bestfeatllres of two other recently proposed self-configurirzg protocols for sensor networks: the Localized protocol and the ...
متن کاملAn application-specific protocol architecture for wireless microsensor networks
Networking together hundreds or thousands of cheap microsensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. These networks require robust wireless communication protocols that are energy efficient and provide low latency. In this paper, we develop and analyze low-energy adaptive clustering hierarchy (LEACH), a proto...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملAn Energy Efficient Cluster Formation Protocol with Low Latency In Wireless Sensor Networks
Data gathering is an essential operation in wireless sensor network applications. So it requires energy efficiency techniques to increase the lifetime of the network. Similarly, clustering is also an effective technique to improve the energy efficiency and network lifetime of wireless sensor networks. In this paper, an energy efficient cluster formation protocol is proposed with the objective o...
متن کاملSecuring Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
Serious security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network i...
متن کامل