Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

被引:0
作者
Ozdemir, Suat [1 ]
机构
[1] Gazi Univ, Dept Comp Engn, TR-06570 Ankara, Turkey
关键词
sensor networks; congestion; load balancing; data aggregation; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, sensing driven nature of data generation and uneven cluster sizes result in unbalanced data traffic load among clusters. Clusters ill which the event generation rate is high and/or clusters that have more members than others suffer from congestion and data loss which negatively affect the accuracy of the collected data. In addition, the cluster heads of such clusters exhaust their energy earlier than others, thereby reducing the network lifetime. Hence, the data load among clusters must be balanced to preserve the data accuracy and prolog the network lifetime. This paper presents Secure Load Balancing (SLB) protocol and introduces pseudo-sinks in order to improve data accuracy and bandwidth utilization of wireless sensor networks while still providing secure communication. Simulation results show that, in comparison with traditional cluster based networks, SLB protocol improves the data accuracy and increases the data delivery rate in the presence of security constraints.
引用
收藏
页码:1691 / 1705
页数:15
相关论文
共 24 条
[1]   A survey on clustering algorithms for wireless sensor networks [J].
Abbasi, Ameer Ahmed ;
Younis, Mohamed .
COMPUTER COMMUNICATIONS, 2007, 30 (14-15) :2826-2841
[2]   On the relaying capability of next-generation GSM cellular networks [J].
Aggélou, GN ;
Tafazolli, R .
IEEE PERSONAL COMMUNICATIONS, 2001, 8 (01) :40-47
[3]  
Akyildiz I. F., 2004, Ad Hoc Networks, V2, P351, DOI DOI 10.1016/J.ADH0C.2004.04.003
[4]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[5]  
BLUMENTHAL J, 2006, P 3 ANN IEEE COMM SO, V3, P761
[6]   Energy-efficient secure pattern based data aggregation for wireless sensor networks [J].
Çam, H ;
Özdemir, S ;
Nair, P ;
Muthuavinashiappan, D ;
Sanli, HO .
COMPUTER COMMUNICATIONS, 2006, 29 (04) :446-455
[7]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[8]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[9]  
DE S, 2002, P 35 HAW INT C SYST, P3931
[10]  
Dostanic M.R., 2005, MATEMATICKI VESNIK, P11