CFP last date
20 March 2024
Reseach Article

Secure based Clustering Algorithm for Wireless Sensor Networks

by G. Vennira Selvi, R. Balasubramanian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 1
Year of Publication: 2015
Authors: G. Vennira Selvi, R. Balasubramanian

G. Vennira Selvi, R. Balasubramanian . Secure based Clustering Algorithm for Wireless Sensor Networks. International Journal of Computer Applications. 117, 1 ( May 2015), 13-17. DOI=10.5120/20517-2137

@article{ 10.5120/20517-2137,
author = { G. Vennira Selvi, R. Balasubramanian },
title = { Secure based Clustering Algorithm for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 1 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { },
doi = { 10.5120/20517-2137 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:58:30.308817+05:30
%A G. Vennira Selvi
%A R. Balasubramanian
%T Secure based Clustering Algorithm for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 1
%P 13-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Protecting the data from intruders and increasing the network lifetime is a major constraint in Wireless Sensor Network. The lifetime of the network is determined by the amount of energy consumed by each node. In order to increase the network lifetime and protect the data, the security based clustering algorithm is proposed. It construct the clusters to reduce the energy consumption among the sensor nodes in which the cluster head collects and aggregate the data from the cluster members. A special node MDC collects and aggregates the data from cluster head and forwards them to Base station. The data are protected from intruders by authenticates the Cluster head by MDC using the shared secret key and the Digital Signature. The simulation results prove that our algorithm is more efficiently secure the data and achieves more energy savings than Time Stamp Protocol and Polynomial Points Sharing Protocol.

  1. W. Su Y. Sankarasubramaniam E. Cayirci Akyildiz, I. F. A survey on sensor- networks. IEEE Communications Magazine, pages 102{114, 2002.
  2. Kumar. S. P. Chee-Yee Chong. Sensor networks: Evolution, opportunities, and challenges. Proc IEEE, August 2003.
  3. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An
  4. Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Comm. , vol. 1, no. 4, pp. 660- 670, Oct. 2002.
  5. L. B. Oliveira, H. C. Wong, M. W. Bern, R. Dahab, and A. A. Loureiro, "SecLEACH-a random key distribution solution for securing clustered sensor networks," Proc. Of 5th IEEE Int'l Symp. On Network Computing and Applications, Cambridge, Massachusetts, USA, Jul. 24-26, 2006
  6. L. Buttyan and T. Holczer, "Private Cluster Head Election in Wireless Sensor Networks," Proc. of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09), IEEE, pp. 1048-1053, 2009
  7. M. Sirivianos et al. , "Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks," Proc. of Int'l Sympo. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), Cyprus, pp. 1-10, Apr. 2007
  8. P. Banerjee, D. Jacobson, and S. Lahiri, "Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks," Proc. IEEE Sixth Int'l Symp. Network Computing and Applications (NCA), pp. 145-152, 2007.
  9. A. S. Poornima1 B. B. Amberker, "Secure data collection using mobile data collector in clustered wireless sensor networks", Published in IET Wireless Sensor Systems Received on 25th October 2011 Revised on 7th February 2011 doi: 10. 1049/iet-wss. 2010. 0086
  10. A S Poornima, B. B. Amberker Tree-based Key Management Scheme for Heterogeneous Sensor Networks 14th IEEE International Conference on Networks, New Delhi, 2008.
  11. Sarika Agarwal Leszek Lilien Maleq Khan, Bharat Bhargava and Pankaj. Self-configuring node clusters, data aggregation, and security in microsensor networks. Department of Management Information Systems Krannert Grad- uate School of Management Purdue University, West Lafayette, (IN 47907), 2007. pankaj@mgmt. purdue. edu.
  12. Sundeep Karthikeyan Vaidynathan, Sayantan sur and Sinha. Data aggregation techniques in sensor networks. Technical Report,OSU-CISRC-11/04- TR60, 2004.
  13. D. Agrawal N. Shrivastava, C. Buragohain and S. Suri. Medians and beyond: new aggregation techniques for sensor networks. Proceedings of the 2nd inter- national conference on Embedded networked sensor systems, pages 239{249, 2004. ACM Press.
  14. Xiuli Ren and Haibin Yu1. Security mechanisms for wireless sensor networks. IJCSNS International Journal of Computer Science and Network Security, VOL. 6(No. 3):100{107, March 2006.
  15. S. Setia S. Zhu and S. Jajodia. Leap: efficient security mechanisms for large scale distributed sensor networks. Proceedings of the 10th ACM conference on Computer and communications security, pages 62{72, 2003. ACM Press.
  16. A. Chandrakasan W. R. Heinzelman and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor network. IEEE Proceedings of the Hawaii International Conference on System Sciences, pages 1{10, Jan- uary 2000.
Index Terms

Computer Science
Information Sciences


Clustering Network Lifetime Security