—In wireless sensor networks, since a CH gathers data from members and delivers the gathered data to the sink, preventing a compromised node from being a CH is very important. Even though unveiling the CH election process enhances the security of network, it cannot prevent compromised nodes from declaring themselves as CHs without qualification. In this paper, we propose a scheme which identifies the compromised nodes by evaluating the trust level of members and excludes untrustworthy nodes every CH election round. Our analyses show that our scheme outperforms the scheme which only unveils the CH election process without filtering.
—Secure cluster head election, trust-based election, clustering, wireless sensor network.
Gicheol Wang is with the Agency for Defense Development, Daejeon 305-152, Korea (e-mail: gcwang@ add.re.kr).
Gihwan Cho is with the Div. of Computer Science and Engineering Cloud Open R&D Center, Chonbuk Nat’l University, Jeonbuk, Jeonju 561-756, Korea (e-mail: firstname.lastname@example.org).
Cite:Gicheol Wang and Gihwan Cho, "Securing Cluster Head Elections in Wireless Sensor Networks," Journal of Advances in Computer Networks vol. 2, no. 4, pp. 243-247, 2014.