An Energy Efficient, Fault Tolerant and Secure Clustering Scheme for M2M Communication Networks

被引:0
作者
Karim, Lutful [1 ]
Anpalagan, Alagan [2 ]
Nasser, Nidal [3 ]
Almhana, Jalal N. [4 ]
Woungang, Isaac [2 ]
机构
[1] Seneca Coll Appl Arts & Technol, Sch ICT, Toronto, ON, Canada
[2] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON, Canada
[3] Alfaisal Univ, Coll Engn, Riyadh, Saudi Arabia
[4] Univ Moncton, Dept Comp Sci, Moncton, NB E1A 3E9, Canada
来源
2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2013年
关键词
Terms Machine to Machine (M2M) Communications; Energy Efficiency; Clustering; Security and Privacy;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Machine to Machine (M2M) communication networks starts to achieve widespread usability in different application domains. Thus, designing energy efficient, fault tolerant and secure clustering scheme is significantly important for the M2M area networks that comprise a large number of sensors. However, to the best of our knowledge, existing secure clustering schemes for M2M communication networks do not support fault tolerance and energy efficiency together. Thus, this paper introduces an Energy efficient, fault tolerant and Secure clustering mechanism for M2M (ESM) area networks that minimizes the number of cluster heads (CHs) and active member nodes. The ESM clustering scheme includes a simple, lightweight but very effective security mechanism that uses simple permutation-based shared keys between (i) member nodes and CHs, (ii) inter-cluster gateway nodes and CHs and (iii) CHs and Machine Type Communication (MTC) gateway. Experimental results demonstrate that the ESM clustering scheme reduces network energy consumption as compared to the existing DSC and LEACH protocols. Security analysis also reveals that ESM is effective against well-known attacks such as sybil, wormhole, and black hole.
引用
收藏
页码:677 / 682
页数:6
相关论文
共 16 条
[1]   Simple permutations and pattern restricted permutations [J].
Albert, MH ;
Atkinson, MD .
DISCRETE MATHEMATICS, 2005, 300 (1-3) :1-15
[2]  
[Anonymous], 2010, 2010 IEEE LONG ISL S
[3]  
[Anonymous], 2012, 2012 5 INT C NEW TEC
[4]   Security and performance analysis of a secure clustering protocol for sensor networks [J].
Banerjee, Pubali ;
Jacobson, Doug ;
Lahiri, Soumendra Nath .
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, :145-+
[5]  
Glitho R. H., 2011, 2011 6th International Conference on Broadband and Biomedical Communications (IB2Com), P1, DOI 10.1109/IB2Com.2011.6217900
[6]   An application-specific protocol architecture for wireless microsensor networks [J].
Heinzelman, WB ;
Chandrakasan, AP ;
Balakrishnan, H .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) :660-670
[7]  
Jang Kun-Won, 2006, ICH 2006 INT C HYBR, V2, p97
[8]  
Karim L, 2010, COMM ICC 2010 IEEE I
[9]  
Karim Lutful, 2012, WIRELESS COMMUNICATI
[10]  
Lopez Gregorio, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P217, DOI 10.1109/INFCOMW.2011.5928812