DocumentCode :
3101865
Title :
Heuristic clustering with secured routing in Heterogeneous Sensor Networks
Author :
Gagneja, Kanwalinderjit Kaur ; Nygard, Kendall E.
Author_Institution :
Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
fYear :
2013
fDate :
24-24 June 2013
Firstpage :
9
Lastpage :
16
Abstract :
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end nodes make clusters with high-end nodes. Each cluster has just one high-end node and a number of low-end nodes. Voronoi clusters are driven by the distance between the nodes, but our routing method the “Improved Tree Routing” uses hop count to route the data in the network. However, Voronoi clusters leave out some gaps in the topology. To cover those gaps we used a new meta-heuristic called Tabu search. With Tabu search we adjust the low-end nodes in the Voronoi clusters using cyclic exchange, pairwise exchange, and single moves. Only a few researchers thought of designing routing techniques with embedded security. In our approach we added security to Improved Tree routing. Through simulation, we show that Voronoi-Tabu clustering technique in conjunction with Secure Improved Tree routing performs better than directed diffusion, and LEACH routing protocols. Additionally, the security technique is performing better than E-G, LEAP, and SBK security methods. Simulation results show that the described method increases throughput, and reduces energy utilization and network delays.
Keywords :
computational geometry; pattern clustering; routing protocols; search problems; telecommunication security; wireless sensor networks; Improved Tree Routing; Tabu search; Voronoi clusters; Voronoi-Tabu clustering technique; embedded security; heterogeneous sensor networks; heterogeneous topology; heuristic clustering; high-end node; homogeneous sensor networks; hop count; low-end nodes; wireless sensor network; Conferences; Mobile computing; Privacy; Routing; Routing protocols; Security; Wireless sensor networks; Clustering; Heterogeneous sensor networks; Security; Tabu; Voronoi;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN), 2013 IEEE International Workshop on
Conference_Location :
New Orleans, LA
Type :
conf
DOI :
10.1109/MWSN.2013.6603088
Filename :
6603088
Link To Document :
بازگشت