International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 4, August 2020, pp. 4296~4304
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp4296-4304 4296
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Multi-stage secure clusterhead selection using discrete rule-set
against unknown attacks in wireless sensor network
Tejashwini N.
1
, D. R. Shashi Kumar
2
, K. Satyanarayana Reddy
3
1
Visvesvaraya Technological University, India
2
Department of Computer Science and Engineering, Cambridge Institute of Technology, India
3
Department of Information Science and Engineering, Cambridge Institute of Technology, India
Article Info ABSTRACT
Article history:
Received Jul 5, 2018
Revised Feb 3, 2020
Accepted Feb 26, 2020
Security is the rising concern of the wireless network as there are various
forms of reonfigurable network that is arised from it. Wireless sensor
network (WSN) is one such example that is found to be an integral part of
cyber-physical system in upcoming times. After reviewing the existing
system, it can be seen that there are less dominant and robust solutions
towards mitigating the threats of upcoming applications of WSN. Therefore,
this paper introduces a simple and cost-effective modelling of a security
system that offers security by ensuring secure selection of clusterhead during
the data aggregation process in WSN. The proposed system also makes
construct a rule-set in order to learn the nature of the communication iin
order to have a discrete knowledge about the intensity of adversaries. With
an aid of simulation-based approach over MEMSIC nodes, the proposed
system was proven to offer reduced energy consumption with good data
delivery performance in contrast to existing approach.
Keywords:
Cryptography
Encryption
Energy
Security
Wireless sensor network
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Tejashwini N.,
Visvesvaraya Technological University,
Belagavi, Karnataka, India.
Email: tejashwini.n@gmail.com
1. INTRODUCTION
The usage of wireless network has almost substituted majority of the legacy wired product in past
decade. Although, there are significant advance of the wireless networks, there are potential challenges
too [1]. There is various research works towards investigating the solutions for identifying the challenges in
different forms of wireless network e.g. wireless local area network (WLAN) [2, 3], wireless sensor network
(WSN) [4, 5], mobile adhoc network (MANET) [6, 7], etc. Out of all forms of wireless network, WSN has
got a significant future as it is an integral part of Internet-of-Things (IoT) as well as any cyber-physical
system [6]. There are wide ranges of application supported by WSN that has significantly found its way to
the commercial products. However, security factor is becoming a rising concern because of various reasons.
The first reason of security concern about WSN is that it cannot execute typical cryptographic programs as it
doesn’t have adequate resources to execute complex cryptographic programs [8]. A complex cryptographic
algorithm e.g. RSA (Rivest Shamir Algorithm) is a strongest encryption technique; however, size of the key
for RSA is too large to be consistently used in a resource constraint sensors. The second reason of security
concern is that majority of the existing security approaches are only meant for addressing specific form of
attacks. This increases the development cost and reduces its applicability as malicious program can change at
any point of time. Hence, the applicability of the security solution diminishes in this regard. The third reason
of security concern is that it is not feasible for identifying the attacks generated from cross-platform
networks. This usually happens when two different networking technologies are connected together e.g. IoT
is formed by the integration of sensors and cloud. Where it is one of the most challenging tasks to identify