Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 8961239, 11 pages
https://doi.org/10.1155/2018/8961239
Research Article

A Security Framework for Cluster-Based Wireless Sensor Networks against the Selfishness Problem

Department of Electrical and Computer Engineering, Pusan National University, Busan, Republic of Korea

Correspondence should be addressed to Younghwan Yoo; rk.ca.nasup@omomy

Received 3 March 2018; Revised 30 May 2018; Accepted 26 June 2018; Published 10 July 2018

Academic Editor: Houbing Song

Copyright © 2018 Zeba Ishaq et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–105, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. O. Younis, M. Krunz, and S. Ramasubramanian, “Node clustering in wireless sensor networks: recent developments and deployment challenges,” IEEE Network, vol. 20, no. 3, pp. 20–25, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. P. Kumarawadu, D. J. Dechene, M. Luccini, and A. Sauer, “Algorithms for node clustering in wireless sensor networks: a survey,” in Proceedings of the 4th International Conference on Information and Automation for Sustainability (ICIAFS '08), pp. 295–300, Colombo, Sri Lanka, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Computer Communications, vol. 30, no. 14-15, pp. 2826–2841, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. P. Schaffera, K. Farkas, Á. Horváth, T. Holczer, and L. Buttyán, “Secure and reliable clustering in wireless sensor networks: a critical survey,” Computer Networks, vol. 56, no. 11, pp. 2726–2741, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. Q. Dong and D. Liu, “Resilient cluster leader election for wireless sensor networks,” in Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, Italy, June 2009. View at Scopus
  8. T. Thein, S.-D. Chi, and S. P. Jong, “Increasing availability and survivability of cluster head in WSN,” in Proceedings of the 3rd International Conference on Grid and Pervasive Computing Symposia/Workshops, GPC 2008, pp. 281–285, China, May 2008. View at Scopus
  9. M. Yan, L. Xiao, L. Du, and L. Huang, “On selfish behavior in wireless sensor networks: a game theoretic case study,” in Proceedings of the 3rd International Conference on Measuring Technology and Mechatronics Automation (ICMTMA '11), pp. 752–756, Shangshai, China, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Yoo and D. P. Agrawal, “Why does it pay to be selfish in a MANET?” IEEE Wireless Communications Magazine, vol. 13, no. 6, pp. 87–97, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Yoo, S. Ahn, and D. P. Agrawal, “Impact of a simple load balancing approach and an incentive-based scheme on MANET performance,” Journal of Parallel and Distributed Computing, vol. 70, no. 2, pp. 71–83, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Li, F. Zhou, and J. Du, “LDTS: a lightweight and dependable trust system for clustered wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 924–935, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. H. Yu, Z. Shen, C. Miao, and D. Niyato, “A survey of trust and reputation management systems in wireless communications,” Proceedings of the IEEE, vol. 98, no. 10, pp. 1755–1772, 2010. View at Google Scholar
  14. H. Miranda and L. Rodrigues, “Friends and foes: Preventing selfishness in open mobile ad hoc networks,” in Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003, pp. 440–445, USA, May 2003. View at Scopus
  15. P. Resnick and R. Zeckhauser, “Trust among strangers in internet transactions: empirical analysis of eBay's reputation system,” Advances in Applied Microeconomics, vol. 11, pp. 127–157, 2002. View at Publisher · View at Google Scholar · View at Scopus
  16. K.-F. Ssu, C.-H. Chou, and L.-W. Cheng, “Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks,” Computer Communications, vol. 30, no. 11-12, pp. 2342–2352, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Paek, K. Chintalapudi, R. Govindan, J. Caffrey, and S. Masri, “A wireless sensor network for structural health monitoring: Performance and experience,” in Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors, EmNetS-II, pp. 1–10, Australia, May 2005. View at Scopus
  18. Z. Ishaq, S. Park, and Y. Yoo, “A security framework for Cluster-based Wireless Sensor Networks against the selfishness problem,” in Proceedings of the 7th International Conference on Ubiquitous and Future Networks, ICUFN 2015, pp. 7–12, Japan, July 2015. View at Scopus
  19. A. R. Chowdhury, T. Chatterjee, and S. DasBit, “LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network,” Procedia Computer Science, vol. 32, pp. 497–504, 2014. View at Publisher · View at Google Scholar
  20. L. B. Oliveira, A. Ferreira, M. A. Vilaça et al., “SecLEACH-on the security of clustered sensor networks,” Signal Processing, vol. 87, no. 12, pp. 2882–2895, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao, “Non-manipulable aggregator node election protocols for wireless sensor networks,” in Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2007, Cyprus, April 2007. View at Scopus
  22. S. Vasudevan, B. DeCleene, N. Immerman, J. Kurose, and D. Towsley, “Leader election algorithms for wireless ad hoc networks,” in Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX 2003, pp. 261–272, USA, April 2003. View at Scopus
  23. G. Gulhane and N. Mahajan, “Performance evaluation of wireless sensor network under black hole attack,” Inter- national Journal of Computing and Technology, pp. 92–96, 2014. View at Google Scholar
  24. Y. Chae, L. C. DiPippo, and Y. L. Sun, “Trust management for defending on-off attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1178–1191, 2015. View at Publisher · View at Google Scholar
  25. Z. Lu, Y. E. Sagduyu, and J. H. Li, “Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks,” in Proceedings of the 34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015, pp. 253–261, Hong Kong, May 2015. View at Scopus