A Survey on Hierarchical Cluster Based Secure Routing Protocols and Key Management Schemes in Wireless Sensor Networks

Authors(2) :-Yugashree Bhadane, Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.

Authors and Affiliations

Yugashree Bhadane
Department of Information Technology, Dhole Patil College of Engineering,Pune, Maharashtra, India
Pooja Kadam
Department of Information Technology, Dhole Patil College of Engineering,Pune, Maharashtra, India

Wireless Sensor Network (WSN), Routing, Hierarchical Cluster Based Routing, Key Management

  1. 21 ideas for the 21st century., Business Week, Aug. 30 1999, pp. 78-167.
  2. Jun Zheng and Abbas Jamalipour, "Wireless Sensor Networks: A Networking Perspective", a book published by A John & Sons, Inc, and IEEEE, 2009.
  3. CY. Chong and S.P. Kumar, "Sensor Networks: Evolution, opportunities, and Challenges", Proceedings of the IEEE, vol. 91, no. 8, Aug. 2003, pp. 1247-1256.
  4. I F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Surveyon Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8,pp. 102-114, Aug 2002.
  5. J N. Al-karaki and A. E. Kamal. Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6):6-28, December 2004.
  6. W R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In Proc. Of the 33rd Hawaii International Conference on System Sciences (HICSS '00), page 8020, Washington, DC, USA, January 2000. IEEE Computer Society.
  7. V Loscri, G. Morabito, and S. Marano. A two-levels hierarchy for low-energy adaptative clustering hierarchy (tl-leach). In Proc. VTC2005, pages 1809-1813, Dallas (USA), September 2005.
  8. M Ye, C. Li, G. Chen, and J.Wu. Eecs: An energy efficient clustering scheme in wireless sensor networks. In Proc. of the IEEE International Performance Computing and Communications Conference, pages 535-540, 2005.
  9. S Lindsey and C. S. Raghavendra. Pegasis: Power-efficient gathering in sensor information systems. In IEEE Aerospace Conference Proceedings, pages 1125-1130, 2002.
  10. S. Jung, Y. Han, and T. M. Chung. The concentric clustering scheme for efficient energy consumption in the pegasis. In Proc. 9th International Conference on Advanced Communication Technology, volume 1, pages 260-265, February 2007.
  11. N. Gautam,W. Lee, and J. Pyun. Track-sector clustering for energy efficient routing in wireless sensor networks. In Proc. of the 2009 Ninth IEEE International Conference on Computer and Information Technology, volume 2, pages 116-121. IEEE Computer Society, 2009.
  12. A. Manjeshwar and D. P. Agrawal. Teen: a routing protocol for enhanced efficiency in wireless sensor networks. In Proc. 15th International In Parallel and Distributed Processing Symposium, volume 3, pages 2009-2015. IEEE Computer Society, April 2001.
  13. A. Manjeshwar and D. P. Agrawal. Apteen: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. In Proc. of the 16th International Parallel and Distributed Processing Symposium (IPDPS '02), page 48, Washington, DC, USA, 2002. IEEE Computer Society.
  14. J. J. Lotf, M. Hosseinzadeh, and R. M. Albuliev. Hierarchical routing in wireless sensor networks: a survey. In 2nd International Conference on Computer Engineering and Technology, volume 3, pages 650-654, April 2010.
  15. M. Bohge andW. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on Wireless security (WiSe '03), pages 79-87, New York, NY, USA, 2003. ACM.
  16. M. Tubaishat, J. Yin, B. Panja, and S. Madria. A secure hierarchical model for sensor network. ACM SIGMOD Record, 33(1):7-13, March 2004.
  17. B. Parno, M. Luk, E. Gaustad, and A. Perrig. Lha-sp: secure protocols for hierarchical wireless sensor networks. In Proc. of 9th IFIP/IEEE International Symposium on Integrated Network Management, pages 31-44, May 2005.
  18. L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro. Secleach - a random key distribution solution for securing clustered sensor networks. In Proc. of the Fifth IEEE International Symposium on Network Computing and Applications, pages 145-154, Washington, DC, USA, 2006. IEEE Computer Society.
  19. A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C.Wong, and A. A. Loureiro. On the security of cluster-based communication protocols for wireless sensor networks. In Proc. 4th IEEE International Conference on Networking (ICNŠ05), volume 3420 of Lecture Notes in Computer Science, pages 449-458, 2005.
  20. J. Ibriq and I. Mahgoub. A secure hierarchical routing protocol for wireless sensor networks. In In: Proc. 10th IEEE International Conference on Communication Systems, pages 1-U? 6, Singapore, October 2006.
  21. R. Srinath, A. V. Reddy, and R. Srinivasan. Ac: Cluster based secure routing protocol for wsn. In Proc. of the Third International Conference on Networking and Services, page 45, Washington, DC, USA, 2007. IEEE Computer Society.
  22. C. Hong-bing, Y. Geng, and H. Su-jun. Nhrpa: a novel hierarchical routing protocol algorithm for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 15(3):75-81, September 2008.
  23. L. B. Oliveira, A. Ferreira, M. A. Vilaca, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro. Secleach-on the security of clustered sensor networks. Signal Processing, 87(12):2882-2895, December 2007.
  24. D.Wu, G. Hu, and G. Ni. Research and improve on secure routing protocols in wireless sensor networks. In 4th IEEE International Conference on Circuits and Systems for Communications (ICCSC 2008), pages 853-856, May 2008.
  25. K. Zhang, C. Wang, and C. Wang. A secure routing protocol for cluster-based wireless sensor networks using group key management. In Proc. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM'08), pages 1-5, October 2008.
  26. Chen, H. Zhang, and J. Hu. An efficiency security model of routing protocol in wireless sensor networks. In Proc. of the 2008 Second Asia International Conference on Modelling and Simulation, pages 59-64, Washington, DC, USA, 2008. IEEE Computer Society.
  27. Z. Quan and J. Li. Secure routing protocol cluster-gene-based for wireless sensor networks. In Proc. The 1st International Conference on Information Science and Engineering (ICISE2009), pages 4098-4102, December 2009.
  28. Zhou, Y., and Fang, Y. (2007), 'A two-layer key establishment scheme for WSN'. IEEE trans. Mobile Computing, Volume 6, No. 9, pp: 1009-1020.
  29. Zhou, Y., Fang, Y., and Zhang, Y. (2008), 'A survey of Securing Wireless Sensor network'. IEEE communication surveys, Volume 10, No. 3, pp: 6-28.
  30. Chan, H.,and Perrig, A., (2005), 'PIKE: Peer Intermediaries for Key Establishment in Sensor Networks'. In Proceedings of IEEE Infocom, Miami, Florida, pp: 524-535.
  31. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D.Tygar. Spins: Security protocols for sensor networks. Wireless Networks, 8:521 - 534, 2002.
  32. Zhu, S., Setia, S., Jajodia, S. (2003) 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks', CCS '03, Washington D.C., USA, 27 - 31 October 2003, New York, USA: ACM Press, 62-72.
  33. Ibriq, J., and Mahgoub, I. (2007), 'A Hierarchical Key Establishment Scheme for Wireless Sensor Networks'. 21st International Conference on Advanced Networking and Applications, pp: 210-219.
  34. T.A Zia and A.Y. Zomaya, 'A Secure Triple-Key Management Scheme for wireless sensor networks', in the proceedings of INFOCOM 2006,25th IEEE International Conference on Computer Communications, Barcelona, pp1-2 ,23-29 April 2006 .
  35. Naser Alajmi. Ac: Wireless Sensor Networks Attacks and Solutions. In International Journal of Computer Science and Information Security, page 45, Bridgeport, USA, Volume 12, No. 7, July 2014.

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2018
Date of Publication : 2018-11-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 18-26
Manuscript Number : CSEIT183810
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Yugashree Bhadane, Pooja Kadam, "A Survey on Hierarchical Cluster Based Secure Routing Protocols and Key Management Schemes in Wireless Sensor Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.18-26, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183810
Journal URL : https://res.ijsrcseit.com/CSEIT183810 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview