Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks

In a large-scale wireless sensor network, a topology is needed to gather state-based data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal energy consumption, and prolonged network lifetime. In this study, we proposed a ring-based hierarchical c...

Full description

Saved in:
Bibliographic Details
Main Authors: Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh
Format: Article
Language:English
Published: Wiley 2012-07-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2012/162347
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832547891040747520
author Tung-Shih Su
Mei-Wen Huang
Wei-Shou Li
Wen-Shyong Hsieh
author_facet Tung-Shih Su
Mei-Wen Huang
Wei-Shou Li
Wen-Shyong Hsieh
author_sort Tung-Shih Su
collection DOAJ
description In a large-scale wireless sensor network, a topology is needed to gather state-based data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal energy consumption, and prolonged network lifetime. In this study, we proposed a ring-based hierarchical clustering scheme (RHC) consisting of four phases: predeployment, parent-child relationship building, deployment, and member join phases. Two node types are distributed throughout the network: cluster head nodes (type 1 node) and general sensor nodes (type 2 node). The type 1 node has better battery life, software capability, and hardware features than the type 2 node; therefore, the type 1 node is a better cluster head than type 2 node. Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.
format Article
id doaj-art-ffa1668c53a649f2bcb7b8c481c27656
institution Kabale University
issn 1550-1477
language English
publishDate 2012-07-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-ffa1668c53a649f2bcb7b8c481c276562025-02-03T06:43:07ZengWileyInternational Journal of Distributed Sensor Networks1550-14772012-07-01810.1155/2012/162347Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor NetworksTung-Shih Su0Mei-Wen Huang1Wei-Shou Li2Wen-Shyong Hsieh3 Department of Information Management, Fortune Institute of Technology, No. 1-10, Nongchang Rd., Neighborhood 28, Lyouciyou Village, Daliao Township, Kaohsiung County 831, Taiwan Department of Computer Science and Engineering, National Sun-Yat-Sen University, No. 70, Lienhai Rd., Kaohsiung 80424, Taiwan Department of Computer Science and Information Engineering, SHU-TE University, No. 59, Hengshan Rd., Yanchao Dist., Kaohsiung City 82445, Taiwan Department of Computer Science and Information Engineering, SHU-TE University, No. 59, Hengshan Rd., Yanchao Dist., Kaohsiung City 82445, TaiwanIn a large-scale wireless sensor network, a topology is needed to gather state-based data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal energy consumption, and prolonged network lifetime. In this study, we proposed a ring-based hierarchical clustering scheme (RHC) consisting of four phases: predeployment, parent-child relationship building, deployment, and member join phases. Two node types are distributed throughout the network: cluster head nodes (type 1 node) and general sensor nodes (type 2 node). The type 1 node has better battery life, software capability, and hardware features than the type 2 node; therefore, the type 1 node is a better cluster head than type 2 node. Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.https://doi.org/10.1155/2012/162347
spellingShingle Tung-Shih Su
Mei-Wen Huang
Wei-Shou Li
Wen-Shyong Hsieh
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
International Journal of Distributed Sensor Networks
title Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
title_full Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
title_fullStr Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
title_full_unstemmed Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
title_short Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
title_sort aggregation scheme with secure hierarchical clustering for wireless sensor networks
url https://doi.org/10.1155/2012/162347
work_keys_str_mv AT tungshihsu aggregationschemewithsecurehierarchicalclusteringforwirelesssensornetworks
AT meiwenhuang aggregationschemewithsecurehierarchicalclusteringforwirelesssensornetworks
AT weishouli aggregationschemewithsecurehierarchicalclusteringforwirelesssensornetworks
AT wenshyonghsieh aggregationschemewithsecurehierarchicalclusteringforwirelesssensornetworks