Securing Cluster Head Selection in Wireless Sensor Networks

α
Rupinder Singh
Rupinder Singh
σ
Dr. Jatinder Singh
Dr. Jatinder Singh
ρ
Dr. Ravinder Singh
Dr. Ravinder Singh
α Guru Nanak Dev University Guru Nanak Dev University

Send Message

To: Author

Securing Cluster Head Selection in Wireless Sensor Networks

Article Fingerprint

ReserarchID

CSTNWSJK161

Securing Cluster Head Selection in Wireless Sensor Networks Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO flood attack when the malicious sensor node becomes the Cluster Head. Cryptographic and non-cryptographic approaches to detect the presence of HELLO flood attack also exist but they lack efficiency in some way. In this paper, an efficient protocol is proposed for the detection and prevention of HELLO Flood attack in wireless sensor network. Cluster heads are vulnerable to various malicious attacks and this greatly affects the performance of the wireless sensor network. Cryptographic approaches to prevent this attack are not so helpful though some non-cryptographic methods to detect the HELLO Flood attack also exist but they are not too efficient as they result in large test packet overhead.

References

41 Cites in Article
  1. Rupinder Singh,Dr Singh,Dr Singh (2016). Hello flood attack Countermeasures in Wireless Sensor Networks.
  2. W Heinzelman,A Chandrakasan,H Balakrishnan (2000). Energy-efficient communication protocol for wireless microsensor networks.
  3. A Ferreira,M Vilaca,L Oliveira,E Habib,H Wong,A Loureiro (2005). On the security of cluster-based communication protocols for wireless sensor networks.
  4. Adrian Perrig,Robert Szewczyk,J Tygar,Victor Wen,David Culler (2002). SPINS: Security Protocols for Sensor Networks.
  5. L Oliveira,H Wong,M Bern,R Dahab,A Loureiro (2006). SecLEACH-a random key distribution solution for securing clustered sensor networks.
  6. Yaya Shen,Sanyang Liu,Zhaohui Zhang (2015). Detection of Hello Flood Attack Caused by Malicious Cluster Heads on LEACH Protocol.
  7. Sang Kang,Thinh Nguyen (2012). Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks.
  8. Young-Ju Han,Min-Woo Park,Tai-Myoung Chung (2010). SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs.
  9. Vivek Katiyar,Narottam Chand,Gopal Chand Gautam,Anil Kumar (2011). Improvement in LEACH protocol for large-scale wireless sensor networks.
  10. M Saadat,R Saadat,G Mirjality (2010). Improving Threshold Assignment for Cluster Head Selection in Hierarchical Wireless Sensor Networks.
  11. P Ren,J Qian,L Li,Z Zhao,X Li (2010). Unequal Clustering Scheme based LEACH for Wireless Sensor Networks.
  12. Gayatri Devi,Rajeeb Sankar Bal,Nibedita Sahoo (2015). Hello Flood Attack Using BAP in Wireless Sensor Network.
  13. Donggang Liu (2007). Resilient Cluster Formation for Sensor Networks.
  14. Kun Sun,Pai Peng,Peng Ning,Cliff Wang (2006). Secure Distributed Cluster Formation in Wireless Sensor Networks.
  15. S Mayur,H Ranjith (2015). Security Enhancement on LEACH Protocol From HELLO Flood Attack in WSN Using LDK Scheme.
  16. S Rawan,M Suhare,A Manal (2015). Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme.
  17. Dilpreet Kaur,Rupinderpal Singh (2015). Energy level based Hello Flood attack Mitigation on WSN.
  18. Ashu Jyoti,Bansal (2015). Detection of Hello Flood Attack on Leach Protocol Based on Energy of Attacker Node.
  19. Gicheol Wang,Dongkyun Kim,Gihwan Cho (2012). A Secure Cluster Formation Scheme in Wireless Sensor Networks.
  20. Helena Rifà-Pous,Jordi Herrera-Joancomartí (2011). A Fair and Secure Cluster Formation Process for Ad Hoc Networks.
  21. G Crosby,N Pissinou (2007). Cluster-based Reputation and Trust for Wireless Sensor Networks.
  22. L Buttyan,T Holczer (2009). Private Cluster Head Election in Wireless Sensor Networks.
  23. Shikha Magotra,Krishan Kumar (2014). Detection of HELLO flood Attack on LEACH Protocol.
  24. Michael Sirivianos,Dirk Westhoff,Frederik Armknecht,Joao Girao (2007). Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks.
  25. Q Dong,D Liu (2009). Resilient Cluster Leader Election for Wireless Sensor Networks.
  26. Iichiro Nishimura,Tomoyuki Nagase,Youjiro Takehana,Yoshio Yoshioka (2011). Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Network.
  27. J Steffi,Agino Priyanka,S Tephillah,A Balamurugan (2014). Attacks and countermeasures in WSN.
  28. Kaur Satwinder,Mansi Saini,Gupta (2014). Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks.
  29. Akhil Dubey,Deepak Meena,Shaili Gaur (2014). A Survey in Hello Flood Attack in Wireless Sensor Networks.
  30. Virendra Pal,S Singh,Anand Aishwarya,Sweta Ukey,Jain (2013). Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks.
  31. Nusrat Fatema,Remus Brad (2013). Attacks and Counterattacks on Wireless Sensor Networks.
  32. A Anup,Vidya Dhamdhere (2014). Evading Flooding Attack in MANET Using Node Authentication.
  33. Mohammad Sayad,Haghighi,Kamal Mohamedpour,Vijay Varadharajan,Barry Quinn (2011). Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks.
  34. Pal Virendra,Sweta Singh,Jyoti Jain,Singhai (2010). Hello Flood Attack and its Countermeasures in Wireless Sensor Networks.
  35. C Venkata,Mukesh Singhal,James Royalty,Srilekha Varanasi (2006). Security in wireless sensor networks.
  36. Mohamed Osama,Khozium (2008). Hello Flood Counter Measure for Wireless Sensor Network.
  37. A Hamid,Mamun-Or-Rashid,Choong Seon Hong (2006). Defense against lap-top class attacker in wireless sensor network.
  38. Waldir Ribeiro,Pires J´ Unior Thiago,H De Paula,Figueiredo Hao,Chi Wong (2004). Malicious Node Detection in Wireless Sensor Networks.
  39. Jatinder Singh,Dr Gupta,Dr Lakhwinder Kaur (2010). A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN.
  40. Jatinder Singh,Dr Gupta,Dr Lakhwinder Kaur (2012). A Cross-Layer Based Intrusion Detection Technique for Wireless Networks.
  41. Securing Cluster Head Selection in Wireless Sensor Networks.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Rupinder Singh. 2017. \u201cSecuring Cluster Head Selection in Wireless Sensor Networks\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 16 (GJCST Volume 16 Issue E7): .

Download Citation

Issue Cover
GJCST Volume 16 Issue E7
Pg. 31- 40
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.1, I.2.9
Version of record

v1.2

Issue date

January 24, 2017

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7060
Total Downloads: 1918
2026 Trends
Related Research

Published Article

Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO flood attack when the malicious sensor node becomes the Cluster Head. Cryptographic and non-cryptographic approaches to detect the presence of HELLO flood attack also exist but they lack efficiency in some way. In this paper, an efficient protocol is proposed for the detection and prevention of HELLO Flood attack in wireless sensor network. Cluster heads are vulnerable to various malicious attacks and this greatly affects the performance of the wireless sensor network. Cryptographic approaches to prevent this attack are not so helpful though some non-cryptographic methods to detect the HELLO Flood attack also exist but they are not too efficient as they result in large test packet overhead.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Securing Cluster Head Selection in Wireless Sensor Networks

Rupinder Singh
Rupinder Singh Guru Nanak Dev University
Dr. Jatinder Singh
Dr. Jatinder Singh
Dr. Ravinder Singh
Dr. Ravinder Singh

Research Journals