tailieunhanh - Recent advances of secure clustering protocols in wireless sensor networks

In this article, we review the most recent secure clustering protocols in WSNs. We start with a description of the security requirements for WSNs and discuss the existing security schemes. We analyze to what extend they have been applied to the clustering structure of WSNs. Then, we review secure clustering protocols in emerged recent years. Finally, we present a set of criteria which must be applied to build a secure clustering algorithm. | International Journal of Computer Networks and Communications Security VOL. 2, NO. 11, NOVEMBER 2014, 400–413 Available online at: ISSN 2308-9830 Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks MOHAMED ELHOSENY1, HAMDY K. EL-MINIR2, A. M. RIAD3 AND XIAOHUI YUAN4 1, 4 Department of Computer Science and Engineering, University of North Texas, . 1, 3 2 Department of Information Systems, Mansoura University, Egypt Department of Electrical Engineering, Kafr El-Sheikh University, Egypt E-mail: , 2hamdy elminir@, 3amriad2000@, 4 ABSTRACT Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. The ubiquitous WSNs make security a prime issue, and new technologies have been developed recently. In this article, we review the most recent secure clustering protocols in WSNs. We start with a description of the security requirements for WSNs and discuss the existing security schemes. We analyze to what extend they have been applied to the clustering structure of WSNs. Then, we review secure clustering protocols in emerged recent years. Finally, we present a set of criteria which must be applied to build a secure clustering algorithm. Keywords: Wireless Sensor Networks, Secure Cluster Formation, Secure Routing, Secure data Aggregation, Security Attacks. 1 INTRODUCTION Wireless Sensor Network (WSN) consists of sensor devices transpired in tangible insecure environments in order to collect data. There have been many applications in health care monitoring, environmental monitoring, industrial logging, etc. The data collected could be sensitive and relevant to privacy, which makes security a prime issue [1], [2]. Unlike conventional networked devices, factors such as open communication medium, limited computational capabilities of nodes, and the disadvantages of bandwidth constraint make WSN more .