An Investigation on Energy-Aware Secured Clustering Algorithm for Wireless Sensor Networks

An Investigation on Energy-Aware Secured Clustering Algorithm for Wireless Sensor Networks

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-11
Year of Publication : 2024
Author : Natraj N. A., Giri G. Hallur, Prasanna Kulkarni, Tripti Dhote, Gopinath S
DOI : 10.14445/22315381/IJETT-V72I11P126

How to Cite?
Natraj N. A., Giri G. Hallur, Prasanna Kulkarni, Tripti Dhote, Gopinath S, "An Investigation on Energy-Aware Secured Clustering Algorithm for Wireless Sensor Networks," International Journal of Engineering Trends and Technology, vol. 72, no. 11, pp. 257-268, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I11P126

Abstract
Wireless Sensor Networks (WSN) are known for their extensive applications in the monitoring process. The future IoT will be dependent on WSN, which is made of WSN nodes. The major issues of WSN are energy efficiency and security. Efficient clustering and integration of security measures in the sensor nodes can overcome those major issues. In this research an Energy Conscious Secured Clustering Algorithm (ECSCA) is proposed to overcome the mentioned issues. The proposed method considers different factors like residual energy, degree of reachability of the sensor node, and cluster head supremacy for efficient cluster formation. After the cluster formation process, the node to node communication should be secured to prevent attacks from the malicious nodes in the network. The proposed method ensures communication by integrating an Elliptic Curve Cryptography (ECC) based security mechanism with the clustering process. The simulation results are analyzed using the existing Secured Localization Routing Protocol (SLRP) scheme and different metrics like packet delay, location accuracy, and Malignant Node Identification Ratio (MNIR). The results proved to be more efficient than the existing scheme.

Keywords
WSNs, Energy ECSCA, ECC, Clustering, Security, Cryptography, ECC.

References
[1] N.A. Natraj, and S. Bhavani, “A Certain Investigation on Secure Localization Routing Protocol for WSN,” Journal of Theoretical & Applied Information Technology, vol. 95, no. 22, pp. 6022-6031, 2017.
[Google Scholar] [Publisher Link]
[2] Kim Khanh Le-Ngo et al., “Optimized Fuzzy Clustering In Wireless Sensor Networks Using Improved Squirrel Search Algorithm,” Fuzzy Sets and Systems, vol. 438, pp. 121-147, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mehdi Hosseinzadeh et al., “A Cluster-Based Trusted Routing Method Using Fire Hawk Optimizer (FHO) in Wireless Sensor Networks (WSNs),” Scientific Reports, vol. 13, no. 1, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Bhisham Sharma, Yogesh kumar, and Vandana Ladha, “Design and Develop ECC for Wireless Sensor Network,” International Journal of Computer Applications, vol. 39, no. 16, pp. 1-7, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[5] I.S. Akila, and R. Venkatesan, “An Efficient Energy Harvesting Assisted Clustering Scheme for Wireless Sensor Networks,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 4, no. 4, pp. 548-558, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[6] P. Thangaraju, and S. Kanjana, “A Secure Energy Efficient and Aware Protocol for WSN,” International Science Press, vol. 9, no. 26, pp. 357-362, 2016.
[Publisher Link]
[7] Junqi Duan et al., “TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 10, no. 1, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[8] I.S. Akila, S.V. Manisekaran, and R. Venkatesan, Modern Clustering Techniques in Wireless Sensor Networks, Wireless Sensor Networks - Insights and Innovations, IntechOpen, London, United Kingdom, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Pooja Gulganwa, and Saurabh Jain, “EES - WCA: Energy Efficient and Secure Weighted Clustering for WSN Using Machine Learning Approach,” International Journal of Information Technology, vol. 14, pp. 135-144, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Reenkamal Kaur Gill, Priya Chawla, and Monika Sachdeva, “Study of LEACH Routing Protocol for Wireless Sensor Networks,” International Conference on Communication, Computing & Systems (ICCCS–2014), pp. 196-198, 2014.
[Google Scholar] [Publisher Link]
[11] V. Vijayalakshmi, and T.G. Palanivelu, “Secure Localization Using Elliptic Curve Cryptography In Wireless Sensor Networks,” International Journal of Computer Science and Network Security, vol. 8, no. 6, pp. 255-261, 2008.
[Google Scholar] [Publisher Link]
[12] Chada Sampath Reddy, and G. Narsimha, “Secure Optimized Routing and Data Transmission in Wireless Sensor Networks with Elliptic Curve Cryptography,” International Journal of Intelligent Engineering and Systems, vol. 15, no. 4, pp. 279-291, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Celso Moraes, and Dongsoo Har, “Charging Distributed Sensor Nodes Exploiting Clustering and Energy Trading,” IEEE Sensors Journal, vol. 17, no. 2, pp. 546-555, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Hong Fu, Xiaoming Wang, and Yingshu Li, “Adaptive Energy and Location Aware Routing in Wireless Sensor Network,” Wireless Algorithms, Systems, and Applications: 5th International Conference, Beijing, China, pp. 105-109, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Kashif Naseer Qureshi et al., “Optimized Cluster-Based Dynamic Energy-Aware Routing Protocol For Wireless Sensor Networks In Agriculture Precisión,” Journal of Sensors, vol. 2020, no. 1, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Amine Rais, Khalid Bouragba, and Mohammed Ouzzif, “Routing and Clustering of Sensor Nodes in the Honeycomb Architecture,” Journal of Computer Networks and Communications, vol. 2019, no. 1, pp. 1-12, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Hamid Mahboubi et al., “Maximum Lifetime Strategy for Target Monitoring with Controlled Node Mobility in Sensor Networks with Obstacles,” IEEE Transactions on Automatic Control, vol. 61, pp. 3493-3508, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[18] CS. Firdozali, and T. Nagamalar, “Energy Aware Mobile Sink Based RPL Routing Protocol for Wireless Sensor Networks,” International Journal of Latest Technology in Engineering, vol. 5, no. 4, pp. 74-78, 2016.
[Google Scholar] [Publisher Link]
[19] Amjad Mehmood et al., “Improvement of the Wireless Sensor Network Lifetime Using LEACH with Vice-Cluster Head,” Adhoc & Sensor Wireless Networks, vol. 28, no. 1-2, pp. 1-23, 2015.
[Google Scholar] [Publisher Link]
[20] Amjad Mehmood et al., “Energy-Efficient Multi-Level and Distance-Aware Clustering Mechanism for WSNs,” International Journal of Communication Systems, vol. 28, no. 5, pp. 972-989, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Meble Varghese, and M. Victor Jose, “Securing Cloud from Attacks: Machine Learning Based Intrusion Detection in Cloud Sensor Networks,” Adhoc & Sensor Wireless Networks, vol. 50, no. 1-4, 2021.
[Google Scholar] [Publisher Link]
[22] Miguel Garcia et al., “Saving Energy and Improving Communications using Cooperative Group-Based Wireless Sensor Networks,” Telecommunication Systems, vol. 52, pp. 2489-2502, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Raquel Lacuesta et al., “A Secure Protocol For Spontaneous Wireless Ad Hoc Networks Creation,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp. 629-641, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Jaime Lloret et al., “A Cluster-Based Architecture to Structure The Topology of Parallel Wireless Sensor Networks,” Sensors, vol. 9, no. 12, pp. 10513-10544, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[25] J. Boobalan, and M. Malleswaran, “Secure Cross Layer Energy Supplementing Adhoc On-Demand Multipath Distance Vector (SCES-AOMDV) Routing Protocol for Energy Efficient Design of Wireless Sensor Networks,” Adhoc & Sensor Wireless Networks, vol. 54, no. 3-4, pp. 219-248, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] S. Saira Banu, “A Secure Multicast Reliability based Authenticated Routing Scheme for Data Integrity in Wireless Sensor Networks,” International Journal for Research in Applied Science & Engineering Technology, vol. 8, no. 4, pp. 1558-1563, 2020.
[Google Scholar] [Publisher Link]
[27] Stefanos A. Nikolidakis et al., “Energy Efficient Routing In Wireless Sensor Networks Through Balanced Clustering,” Algorithms, vol. 6, no. 1, pp. 29-42, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[28] NSNAM Files, Source Forge. [Online]. Available: https://sourceforge.net/projects/nsnam/files/allinone/ns-allinone-2.34/ns-allinone-2.34.tar.gz/download.