Article

Article title DEVELOPMENT OF A SECURE CLUSTER-BASED WIRELESS SENSOR NETWORK MODEL
Authors E.S. Abramov, E.S. Basan
Section SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Month, Year 12, 2013 @en
Index UDC 004.056: 004.73
DOI
Abstract Protection of wireless sensor networks (WSN) is an important issue, since the nodes have low processing power, limited battery life and are located in disadvantaged areas , and the information is transmitted over wireless channels , any violation of the network can lead to undesirable consequences. To date, a large number of methods to protect WSN were developed, as well as intrusion detection systems, but these techniques are mainly designed for static WSN. There is also a need to develop an integrated approach to the protection of WSN, which could resist most of the existing attacks. In this paper we consider a clustering wireless sensor network which needs to be protected. The main aim of this article is development of a secure clustering wireless sensor network model with built-in detection and counteraction mechanisms against malicious impacts (attacks). Trust level calculation algorithm and cluster head (CH) election algorithm are introduced and secure clustering WSN model is described.

Download PDF

Keywords Wireless sensor networks; clustering; attacks; trust; algorithms; anomaly detection; authenticity; intrusion detection method; trust evaluation.
References 1. Akkaya K. and Younis M. A survey on routing protocols for wireless sensor networks // Elsevier Journal of Ad Hoc Networks. – 2005. – № 3 (3). – P. 325.349.
2. Абрамов Е.С., Басан Е.С. Анализ сценариев атак на беспроводные сенсорные сети // Материалы XIII Международной научно-практической конференции «ИБ-2013». Ч. 1. – Таганрог: Изд-во ТТИ ЮФУ, 2013. – С. 60-72.
3. Абрамов Е.С., Басан Е.С. Разработка архитектуры системы обнаружения вторжений для беспроводных сенсорных сетей // Материалы XIII Международной научно-практической
конференции «ИБ-2013». Ч. 1. – Таганрог: Изд-во ТТИ ЮФУ, 2013. – С. 72-79.
4. Wang S.S., Yan K.Q., Wang S.C., Liu C.W. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks // Expert Syst. – Appli., 2011. – № 38. – P.15234-15243.
5. Теплицкая С.Н., Хусейн Я.Т. Энергетически эффективный алгоритм самоорганизации в беспроводной сенсорной сети // Восточно-Европейский журнал передовых технологий. – 2012. – № 2/9 (56). – C. 25-29.
6. Zahariadis1 T., Leligou1 H.C., Trakadas P., Voliotis S. Trust management in wireless sensor networks // Eur. Trans. Telecomms. – 2010. – P. 386-395
7. Mills K.L. A brief survey of self-organization in wireless sensor networks // Wireless Communications and Mobile Computing. – 2007. – Vol. 7, № 7. – P. 823-834.
8. Chatterjee P. Trust based clustering and secure routing scheme for mobile Ad Hoc networks
// International Journal of Computer Networks & Communications (IJCNC). – 2013. – P. 86-395.
9. Abramov E.S., Andreev A.V., Mordvin D.V., Makarevich O.B. Corporate networks security evaluation based on attack graphs. // Proceedings of the 4th international conference on Security of information and networks (SIN '11)-ACM. – New York, NY, USA, 2011. – P. 29-36.

Comments are closed.