Survey on Clustering Techniques for Wireless Sensor Networks and Cluster Head Selection Model (Published)
Low-powered wirelessly connected devices create a system that is self-contained and called Wireless sensor network (WSN), this system has a number of practical applications in the modern world. Nodes in WSN are spread out spatially and have wireless communication with other nodes in the network, these nodes are primarily dedicated to sensing the vicinity and recording the physical properties of the area, including collect observations pertaining to humidity, noise, load, temperature Sensors and other factors at a central station. From there, the end user analyzes the information. After distribution, a cluster is formed between nodes, called a cluster. One of the nodes is selected as the cluster’s head, which is used to migrate the data across the network. Clustering is essential in addressing many issues in WSN, particularly in regards to their lifetime, energy savings, and interoperability. Many approaches exist for clustering WSN, the difference between them is in the choice of CH, the number of clusters, the structure of clusters, the policy for data aggregation, the efficiency of communication between clusters, and the choice of communication between internal and external clusters. This article provides a comprehensive comparison of various methods of clustering and their advantages and disadvantages in WSNs. It also describes the principles of CH selection and how it works within each category. This helps the end user to choose the most suitable one protocol for their needs, and also will assist researchers in addressing the problems revealed in the process of clustering WSN.
Keywords: Survey, Wireless Sensor Networks, cluster head selection model, clustering techniques
An Energy-Efficient ECC Scheme for Wireless Sensor Networks (Published)
The field of wireless sensor networks (WSNs) combines sensing, computation, and communication into a single tiny device called a sensor. Sensors are equipped with RF radio, processor, memory and hardware. They are also battery powered and therefore have severe energy, bandwidths and memory constraints, and low computational capability. Communication over WSNs is still known to be attack-prone because the constraints of sensors hinder the development of secure modern cryptographic solutions. The Elliptic Curve Cryptography (ECC) technique and the Rivest Shamir Adleman (RSA) algorithm are the two most popular public key cryptographic schemes deployed over wireless networks. The effectiveness of the ECC technique over RSA has been demonstrated in this research. While ECC with very large key sizes is thought to be computationally expensive, it is possible to use smaller primes, or smaller finite fields, with elliptic curves and achieve a level of security comparable to that for much larger integer mod n. Measurements have been made to prove that ECC algorithms can be executed within the memory limits of sensor nodes. An enhanced ECC scheme with collision resistant hash functions is proposed in this research.
Keywords: ECC, RSA, Security, Wireless Sensor Networks, communication, sensors