Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
10
,
No.
4
,
A
ugus
t
2020
,
pp.
4296
~
43
04
IS
S
N:
20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v
10
i
4
.
pp
4296
-
430
4
4296
Journ
al h
om
e
page
:
http:
//
ij
ece.i
aesc
or
e.c
om/i
nd
ex
.ph
p/IJ
ECE
Multi
-
stage
secu
re clust
erhe
ad se
lection u
sing disc
re
t
e rule
-
set
against u
nk
nown attacks in
wire
less sens
or netwo
rk
Te
ja
shwi
ni
N
.
1
,
D
.
R
.
S
hashi
Kum
ar
2
, K
.
S
aty
an
ar
ay
ana
Reddy
3
1
Visvesvara
y
a
T
ec
hnolog
ic
a
l
Un
ive
rsit
y
,
Indi
a
2
Depa
rtment of
Com
pute
r
Scie
n
ce
and
Engi
ne
ering
,
Cambridg
e
I
nstit
ute of Te
chn
olog
y
,
Ind
ia
3
Dep
art
m
ent
of
I
nform
at
ion
Sci
e
nce
and
Engi
ne
e
ring,
C
ambridge Instit
ute of Te
ch
nolog
y
,
Ind
ia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
J
ul
5, 2018
Re
vised Feb
3,
2020
Accepte
d
Fe
b 26,
2020
Secur
ity
is
the
r
ising
conc
ern
of
the
wire
le
ss
ne
twork
as
the
re
a
re
var
ious
form
s
of
reo
nfi
gura
ble
net
wor
k
that
is
ari
se
d
from
it.
W
ir
el
ess
sensor
net
work
(W
SN
)
is
one
such
exa
m
ple
tha
t
is
found
to
be
an
int
e
gra
l
par
t
of
c
y
b
er
-
ph
y
sic
al
s
y
stem
in
up
co
m
ing
ti
m
es.
After
r
evi
ewing
t
he
exi
st
ing
s
y
stem,
it
ca
n
be
see
n
th
at
th
ere
ar
e
le
ss
do
m
ina
nt
and
rob
ust
soluti
ons
towar
ds
m
it
iga
ting
the
threat
s
of
upcoming
appl
i
ca
t
ions
of
W
SN
.
The
ref
or
e
,
thi
s
pape
r
int
ro
duce
s
a
sim
ple
and
cost
-
eff
e
ct
i
ve
m
odel
li
ng
of
a
sec
uri
t
y
s
y
stem
tha
t
offe
r
s
sec
urity
b
y
ensuring
sec
ure
select
ion
of
cl
usterh
ea
d
durin
g
the
data
aggr
eg
at
ion
pro
ce
ss
in
W
SN
.
The
proposed
s
y
stem
al
so
m
ake
s
construc
t
a
rul
e
-
set
in
ord
er
to
le
arn
the
nat
ur
e
of
th
e
comm
unic
a
ti
on
i
in
orde
r
to
have
a
discre
t
e
knowle
d
ge
about
the
in
te
nsit
y
of
advers
ari
es.
W
it
h
an
ai
d
of
sim
ula
ti
on
-
b
ase
d
app
roa
ch
over
ME
MS
IC
nodes,
th
e
proposed
s
y
stem
was
pro
ven
to
offe
r
red
uce
d
ene
rg
y
c
onsum
pti
on
with
good
dat
a
del
iv
er
y
pe
rform
anc
e
in
cont
r
ast t
o
exi
st
ing
app
ro
ac
h.
Ke
yw
or
d
s
:
Crypto
gr
a
phy
Encr
y
ption
Energy
Secu
rity
W
i
reless se
nso
r netw
ork
Copyright
©
202
0
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Tejas
hw
i
ni N
.
,
Visv
es
va
raya
Tech
no
l
og
ic
al
Un
i
ver
sit
y,
Be
la
gav
i,
Karn
at
aka, India
.
Em
a
il
:
te
j
ashwi
ni.n@g
m
ai
l.c
om
1.
INTROD
U
CTION
The
us
a
ge
of
wireless
netw
ork
has
al
m
os
t
su
bst
it
uted
m
a
j
ori
ty
of
the
le
gacy
wi
red
pr
oduct
in
pas
t
decad
e
.
Although,
the
re
are
sign
i
ficant
a
dvance
of
t
he
wireless
netw
orks,
ther
e
are
pote
ntial
chal
le
ng
e
s
too
[1
]
.
T
her
e
is
var
io
us
rese
arch
w
orks
to
wards
in
vestig
at
ing
the
s
olu
ti
on
s
f
or
i
den
ti
f
yi
ng
the
c
halle
ng
e
s
i
n
diff
e
re
nt
form
s
of
wireless
ne
twork
e
.g.
wire
le
ss
local
area
netw
ork
(
WL
AN)
[
2
,
3],
wi
r
el
ess
sens
or
ne
twork
(
WSN)
[4
,
5],
m
ob
il
e
adhoc
netw
ork
(MA
NET
)
[
6
,
7],
et
c.
O
ut
of
al
l
f
or
m
s
of
wi
reless
net
wor
k,
W
SN
ha
s
go
t
a
sig
nifica
nt
fu
t
ur
e
as
it
is
an
integral
par
t
of
I
nter
ne
t
-
of
-
T
hings
(
I
oT)
as
well
as
any
cy
ber
-
ph
ysi
cal
syst
e
m
[6
]
.
Ther
e
are
wide
r
ang
e
s
of
a
pp
li
cat
ion
sup
ported
by
W
S
N
th
at
has
sign
i
fic
antly
fo
un
d
it
s
way
to
the co
m
m
ercia
l pro
du
ct
s.
Ho
wev
e
r, secu
rity
f
act
or is
bec
om
ing
a
rising c
on
ce
r
n because
of
var
io
us reas
on
s
.
The
first
reas
on
of
sec
uri
ty
con
ce
r
n
ab
out
WSN
is
that
it
cannot
e
xecu
te
ty
pical
crypto
gr
a
phic
pro
gr
a
m
s
as
i
t
do
e
sn’t
ha
ve
a
dequate
res
our
ces
to
exec
ute
com
plex
crypt
ogra
ph
ic
pr
ogr
a
m
s
[8
]
.
A
c
om
plex
cryptographic
al
gorithm
e.g
.
RSA
(Rivest
S
ham
ir
Algorith
m
)
is
a
stronge
st
encr
y
ption
te
chn
i
qu
e;
how
ever,
siz
e
of
t
he
key
for
RSA
is
too
la
rg
e
to
be
co
ns
ist
ently
us
ed
in
a
reso
urce
const
raint
sens
or
s
.
The
sec
ond
reas
on
of
se
cur
it
y
con
ce
r
n
is
that
m
ajo
rity
of
th
e
existi
ng
s
ecu
rity
app
r
oac
he
s
are
only
m
ea
nt
f
or
a
ddressi
ng
sp
eci
fic
for
m
of
at
ta
cks.
This
in
creases
the
de
ve
lop
m
ent
cost
and
reduces
it
s
app
li
cabil
it
y
a
s
m
al
iciou
s
pr
ogram
c
an
chan
ge
a
t
any
point
of
ti
m
e.
Hen
ce,
t
he
app
li
cabil
it
y
of
the
sec
ur
it
y
so
luti
on
dim
inishes
in
this
reg
a
rd.
The
t
hird
re
aso
n
of
sec
ur
it
y
co
ncern
is
that
it
is
not
feasi
ble
f
or
ide
ntif
yi
ng
t
he
at
ta
c
ks
ge
ner
at
e
d
from
cro
ss
-
pla
tfor
m
netw
orks.
T
his
us
ually
ha
ppe
ns
w
he
n
two
di
ff
ere
nt
netw
or
king
te
chnol
ogie
s
are
connect
ed
tog
et
her
e.
g.
Io
T
is
form
ed
by
the
inte
gr
at
io
n
of
se
nsor
s
an
d
cl
oud.
Where
it
is
on
e
of
t
he
m
os
t
chall
engi
ng
ta
s
ks
to
i
de
ntify
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Ele
c &
C
om
p
En
g
IS
S
N:
20
88
-
8708
Multi
-
sta
ge
sec
ur
e cl
us
te
rh
e
ad selec
ti
on
us
i
ng d
isc
ret
e
ru
l
e
-
set
…
(
Tejas
hwini N.
)
4297
and
resist
the
at
ta
cks
from
diff
ere
nt
netw
ork
do
m
ai
n.
The
f
ourth
r
easo
n
of
secu
rity
con
c
ern
is
that
it
is
qu
it
e
chall
eng
i
ng
to
identify
the
pr
ese
nce
of
at
ta
cker
for
a
gi
ven
sce
na
rio
of
wireless
c
om
m
un
ic
at
ion
.
Hen
ce
,
irres
pecti
ve
of
pr
ese
nce
of
m
any
enc
ryptio
n
m
et
ho
ds
over
wireless
netw
ork
,
there
is
sti
ll
a
huge
researc
h
ga
p
as
no
ne
of
the
existi
ng
sec
ur
it
y
-
base
d
a
ppr
oa
ches
offe
rs
resi
sta
nce
to
the
ultim
a
te
threat
[
9
-
13]
.
It
can
be
al
so
sai
d
that
the
e
xisti
ng
f
or
m
s
of
hard
war
e
a
nd
netw
ork
a
r
chite
ct
ur
e
of
s
ens
or
node
is
def
i
nitel
y
no
t
read
y
to
m
ake secure tr
ansm
issi
on
ove
r
wi
reless
netw
ork.
At
pr
ese
nt,
s
ecur
it
y
appr
oa
ches
are
de
sign
e
d
usi
ng
crypto
gr
a
phic
appr
oach
es
m
ai
nly
wh
ic
h
do
m
inantly
use
s
secret
keys
that
are
re
qu
i
r
ed
to
be
sto
re
d
safely
withi
n
the
nodes
a
nd
will
be
us
e
d
again.
It
will
m
ean
t
hat
us
a
ge
of
ke
y
-
base
d
e
nc
r
ypti
on
is
only
good
wh
e
n
it
hav
e
m
ulti
ple
nu
m
ber
s
of
pa
sses
t
o
gen
e
rate
the
se
cret
key u
sin
g
so
m
e
co
m
plex
m
at
he
m
at
ic
a
l
fu
nctio
n.
It w
il
l
al
so
m
ean
that
there w
il
l
be
hi
gh
e
r
us
a
ge
of
sto
ra
ge
an
d
proces
sing
ca
pab
il
it
y
of
the
node
that
will
sign
ific
antly
dr
a
in
it
s
ener
gy
any
way.
Ther
e
f
or
e,
the
m
os
t
sign
ific
ant
el
igibil
it
y
factor
of
the
r
obus
t
e
ncr
y
ption
te
ch
nique
i
s
that
it
shou
l
d
be
li
gh
twei
ght.
B
y
li
gh
twei
gh
t,
it
will
m
ean
t
hat
the
al
gorithm
sh
ou
ld
ha
ve
le
ss
it
erati
on
s,
it
sh
ould
n’
t
store
m
uch
interm
e
diate
sta
le
m
e
ssage
to
av
oid
ov
e
r
head
s
.
H
ence,
it
is
re
quire
d
that
a
good
sec
ur
it
y
a
lgorit
h
m
sh
oul
d
ha
ve
be
tt
er
com
m
un
ic
at
ion
ca
pab
il
it
y
as
well
as
le
sser
res
ource
consum
ption
for
en
surin
g
be
tt
er
netw
ork
li
feti
m
e. Th
ere
f
or
e,
the pr
opos
e
d
s
yst
e
m
targ
et
s to
a
ddres
s t
he
a
bove
-
m
entioned
prob
le
m
s asso
ci
at
e
d
with
sec
ur
it
y
pro
blem
in
wireless
net
wor
ki
ng
ta
king
the
case
stu
dy
of
wireless
se
nsor
netw
ork
(
WSN).
The
pap
e
r
al
so
pr
ese
nts
a
sim
ple
an
d
li
gh
t
w
ei
gh
t
enc
ryptio
n
m
et
ho
do
l
og
y
that
is
prov
e
n
to
offe
r
good
e
nergy
savi
ng
an
d
bet
te
r
data
delive
ry
perform
ance.
Sect
ion
2
discuss
es
a
bout
al
gorithm
i
m
pl
e
m
entat
ion
fo
l
lowe
d
by d
isc
us
si
on
of r
es
ult analy
s
is i
n
sect
io
n 3. Fi
nally
, th
e c
oncl
us
i
ve
rem
ark
s a
re
pro
vid
e
d
in
secti
on
4.
T
h
e
r
e
a
r
e
v
a
r
i
o
u
s
a
m
o
u
n
t
o
f
r
e
s
e
a
r
c
h
-
b
a
s
e
d
c
o
n
t
r
i
b
u
t
i
o
n
i
n
o
r
d
e
r
t
o
d
e
a
l
w
i
t
h
s
e
c
u
r
i
t
y
p
r
o
b
l
e
m
s
i
n
W
S
N
.
The
recent
w
ork
car
ried
out
by
Z
hang
et
al
.
[
14]
ha
ve
int
rod
uced
a
sec
uri
ty
appro
ac
h
towa
r
ds
sa
fegu
ard
i
ng
the
com
m
un
ic
at
ion
ov
e
r
rela
y
netw
orks
with
m
or
e
em
ph
asi
s
on
physi
c
al
la
ye
r
secur
i
ty
.
The
prob
le
m
of
falsi
fied
i
nj
ect
ion
of
data
is
addresse
d
m
os
t
recently
by
Yang
et
al
.
[15]
us
i
ng
a
dat
a
f
us
io
n
a
ppr
oa
ch
for
adv
a
nce
d
ap
pl
ic
at
ion
of
cy
be
r
-
ph
ysi
cal
syst
e
m
.
Tia
n
et
a
l.
[16]
hav
e
presented
a
cr
oss
-
la
ye
r
ap
proa
ch
f
or
enh
a
ncini
g
the
sp
ect
r
um
eff
ic
ie
ncy
ov
er
m
ulti
-
hop
netw
ork
.
H
ua
ng
et
a
l.
[17]
ha
ve
presented
a
gro
up
-
key
base
d
secu
rity
appr
oach
in
order
to
a
ddress
the
com
m
un
ic
at
ion
over
hea
d
prob
le
m
s
in
WSN
integ
rated
with
so
ft
war
e
dev
ic
e
networ
ks
.
Al
-
Tu
r
j
m
an
et
a
l.
[1
8]
ha
ve
pre
sented
a
key
-
a
ggrem
ent
schem
e
us
ing
pu
blic
key
encr
y
ption
co
nsi
der
in
g
m
ob
il
e
sin
k.
Zha
o
e
t
al
.
[
19
]
ha
ve
i
m
ple
m
ented
com
po
sit
e
key
Pr
e
distrib
utio
n
for
secur
i
ng
the
vulne
rab
le
c
omm
un
ic
at
ion
s.
T
he
a
pproach
of
rek
ey
i
ng
proc
ess
has
bee
n
re
vised
i
n
the
ap
proac
h
of
Aissa
ni
et
al
.
[20]
to
ge
ne
rate
a
uniq
ue
ke
y
m
anag
em
ent
syst
e
m
with
l
ess
over
hea
d.
Ca
o
et
al
.
[
21
]
have
pr
ese
nted
a
n
ide
ntific
at
ion
schem
e
of
rand
om
at
ta
c
ks
i
n
WSN
for
sec
uri
ng
the
relay
net
works.
Im
ple
m
entation
of
asy
m
m
etr
ic
encr
y
ption
was
car
ried
ou
t
by
Chen
et
al
.
[22]
usi
ng
ha
r
dware
-
base
d
appr
oach.
A
uniq
ue
auth
enti
cat
ion
prot
oco
l
was
pr
e
sente
d
by
Chu
et
al
.
[23]
us
in
g
sim
il
ar
har
dwa
re
-
base
d
appr
oach that
us
es sim
ple exc
lusive
-
or
op
e
r
at
ion
for
e
ncr
y
ption.
Ado
ption
of
c
hao
ti
c
ap
proac
h
was
ca
rr
ie
d
ou
t
in
the
w
ork
of
G
opal
akr
i
sh
n
an
a
nd
B
ha
gyave
ni
[24]
.
The
aut
hors
use
d
this
sche
m
e
fo
r
sel
ect
ion
of
the
sec
ur
e
li
nks
with
be
tt
er
data
de
li
ver
y
perfor
m
ance.
Hon
g
et
al
.
[2
5]
ha
ve
ad
op
te
d
a
gam
e
theor
y
-
base
d
m
od
el
for
resist
ing
a
ny
form
of
at
ta
cks
rela
te
d
to
the
interfe
re
nc
e.
Li
et
al
.
[
26
]
hav
e
im
ple
m
e
nted
a
ge
ne
rati
on
a
ppr
oach
for
sy
m
m
et
ric
ke
y
us
ing
gro
up
-
base
d
com
m
un
ic
at
ion
syst
em
as
w
el
l
as
sign
al
stren
gth
facto
r.
Sh
in
et
al
.
[
27
]
hav
e
prese
nted
a
co
nce
pt
of
m
ulti
-
factor
a
uth
e
nti
cat
ion
syst
em
t
hat is m
eant fo
r
secu
rin
g
the
WSN that i
s jo
intl
y op
erate
d wit
h
5G tec
hn
ologies.
Nkwe
et
al
.
[
28]
ha
ve
prese
nted
sec
uri
ty
ov
e
r
the
physi
cal
la
ye
r
us
in
g
er
ror
factor
and
powe
r
as
pe
ct
fo
r
form
ulati
ng
se
cur
it
y
poli
ci
es.
Sh
im
et
al
.
[
29]
ha
ve
present
ed
a
n
a
uth
e
ntica
ti
on
a
ppr
oach
us
i
ng
ide
ntit
y
-
base
d
sign
at
ur
e
po
li
c
y.
A
uniq
ue
at
ta
ck
identific
at
ion
f
ram
ewo
r
k
is
pr
ese
nted
by
Su
n
et
al
.
[
30]
that
m
ake
us
e
of
pr
i
ncipal
com
po
ne
nt
analy
sis
in
order
to
m
i
nim
iz
e
the
depend
e
ncies
of
m
or
e
nu
m
ber
of
detect
ion
fe
at
ur
es
.
Ado
ption
of
s
ymm
et
ric
key
pr
act
ic
es
w
as
wi
tnesse
d
in
t
he
w
ork
of
Ol
iveira
et
al
.
[
31]
where
lo
w
energy
dev
ic
es
a
re
use
d
re
duci
ng
th
e
ov
e
r
head
s
of
the
co
ntr
ol
m
essage.
The
te
chn
i
qu
e
us
es
a
dv
a
nce
d
e
ncr
y
ption
sta
nd
a
rd
for
pe
rfor
m
ing
secu
rity
.
Pintea
et
al
.
[32]
ha
ve
e
m
ph
asi
zed
on
the
us
a
ge
of
th
e
sen
sit
ive
age
nts
in
order
to
resist
s
de
nial
of
ser
vi
ce
at
ta
cks
in
WSN.
Ha
n
et
a
l.
[33]
ha
ve
im
plem
ented
the
con
ce
pt
of
i
de
ntifyi
ng
the
le
vel
of
int
ru
si
on
in
orde
r
to
resist
the
si
nkhole
at
ta
ck
i
n
WSN.
The
re
fore,
it
ca
n
be
seen
t
hat
the
re
are
diff
e
re
nt
form
s
o
f
ap
proac
hes
in
existi
ng
sy
stem
fo
r
resist
ing
sec
ur
it
y
thr
eat
s
in
wireles
s
netw
ork.
T
he
br
ie
f
ou
tl
inin
g o
f
th
e pro
blem
s asso
ci
at
ed wit
h
t
he
ex
ist
in
g
syst
e
m
is discusse
d i
n
ne
xt secti
on.
The
si
gn
i
ficant
r
esea
rch p
robl
e
m
s ar
e as
fo
ll
ow
s:
The
secu
rity
appr
oac
hes
of
e
xisti
ng
syst
em
are
m
or
e
fo
cu
s
ed
towa
r
ds
ad
dressi
ng
so
l
utio
n
again
st
sp
eci
fic
secur
it
y t
hreat
.
Evid
e
nce
to
w
ard
s
res
ource
-
eff
ic
ie
ncy
a
bout
the
existi
ng
sec
ur
it
y
ap
proac
hes
are
no
t
pro
ven
i
n
existi
ng li
te
ratur
es
.
Stud
y
to
wards
le
ss
co
m
pu
ta
ti
on
al
com
pl
exity
factor
associat
ed
with
cryptogra
ph
i
c
us
age
to
wa
r
ds
secur
i
ng vulne
rab
le
wireless
netw
ork
is l
ess
pro
m
inent.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4296
-
4304
4298
Av
ai
la
bili
ty
of
le
ss
ben
c
hm
ark
ed
s
olu
ti
on
t
owar
ds
pote
ntia
l
resist
ance
ag
ai
ns
t
le
thal
at
ta
ck
is
f
ound
le
ss
in ex
ist
in
g
li
te
r
at
ur
es.
Ther
e
f
or
e,
t
he
pro
blem
s
ta
teme
nt
of
the
pr
opos
e
d
stu
dy
can
be
sta
te
d
as
“De
velo
ping
a
pote
ntial
s
ecur
it
y
so
luti
on
to
resi
st
unknow
n
f
orm
s
of
at
ta
ck
in
wireless
netw
ork
us
in
g
c
os
t
eff
ect
ive
resist
ive
so
l
ution
wi
th
f
a
r
reachi
ng ef
fect”. T
he next se
c
ti
on
ou
tl
ines
th
e so
l
ution t
owa
rd
s
r
esi
sti
ng t
he
se proble
m
s.
The
im
ple
m
e
ntati
on
of
t
he
propose
d
te
c
hn
i
qu
e
is
ca
r
ried
ou
t
usi
ng
an
a
naly
ti
cal
researc
h
m
et
ho
dolo
gy
and
the
pro
posed
syst
em
ac
ts
as
an
extensio
n
of
our
pr
i
or
w
ork
[
34]
.
The
c
or
e
aim
of
the
pro
posed
te
ch
nique
is
to
offe
r
a
sig
nificant
pr
otect
ion
agai
ns
t
an
unkn
own
f
orm
of
adv
e
rsa
ry
in
WSN
us
in
g
s
i
m
ple
and
ye
t
rob
us
t
form
of
secu
rity
m
echan
ism
.
The
schem
at
ic
diagr
am
to
re
present
the im
ple
m
ent
at
ion
of prop
ose
d
syst
em
is h
igh
li
ghte
d i
n Fi
g
ure
1
.
P
r
e
p
a
r
a
t
i
o
n
o
f
t
h
e
S
i
m
u
l
a
t
i
o
n
A
r
e
a
C
o
n
s
t
r
u
c
t
i
o
n
o
f
R
u
l
e
-
S
e
t
P
r
i
m
a
r
y
r
u
l
e
-
s
e
t
ϕ
P
S
e
c
o
n
d
a
r
y
R
u
l
e
-
S
e
t
ϕ
s
A
s
s
e
s
s
i
n
g
I
n
t
e
n
s
i
t
y
o
f
A
d
v
e
r
s
a
r
y
A
p
p
l
y
i
n
g
R
u
l
e
-
S
e
t
t
o
R
e
s
i
s
t
A
d
v
e
r
s
a
r
y
L
o
g
i
c
o
f
I
d
e
n
t
i
f
i
c
a
t
i
o
n
a
n
d
R
e
s
i
s
t
a
n
c
e
S
e
n
s
o
r
s
d
i
s
t
a
n
c
e
a
d
v
e
r
s
a
r
y
E
n
e
r
g
y
Figure
1. Pro
pose
d
sc
hem
at
ic
diag
ram
Fig
ure
1
hi
gh
l
igh
ts
the
i
m
ple
m
entat
ion
flo
w
of
the
pr
opos
e
d
syst
e
m
wh
e
re
it
can
be
seen
that
the
pro
po
se
d
syst
e
m
con
sid
ers
init
ia
ll
y
a
ty
pical
pr
ep
arati
on
of
the
si
m
ulati
on
area
by
co
ns
id
erin
g
the
sens
or
s
,
distance,
ad
ver
s
aries,
an
d
ene
rg
y
facto
r.
T
he
pr
op
os
e
d
syst
e
m
a
lso
consi
der
s
that
ad
ver
sa
ry
m
od
ule
is
qu
it
e
po
te
ntial
;
howev
e
r,
it
will
ne
ver
la
un
c
h
a
ny
at
ta
ck
wh
e
n
it
j
oin
s
a
new
netw
ork.
Hen
c
e,
there
is
no
ap
rio
ri
inform
ation
ab
out
the
adv
e
r
sa
r
y.
The
pro
pose
d
syst
e
m
al
so
const
ru
ct
s
a
r
ul
e
-
set
that
is
fu
rt
her
cl
assifi
ed
in
t
wo
f
or
m
s
i.e.
pr
im
ary
Rulese
t
and
seco
nd
ary
r
ule
-
set
.
T
hese
ru
le
set
s
are
m
eant
to
pe
rfor
m
a
sp
eci
fic
ta
sk
of
sel
ect
ion
o
f
secur
e
cl
ust
erhea
d.
T
he
pr
im
a
ry
ru
le
-
set
is
m
ean
t
for
ens
ur
i
ng
sel
ect
io
n
of
m
os
t
el
igible
cl
us
te
r
head
f
ollo
wed
by
sec
onda
ry
Rulese
t
that
is
m
eant
to
perform
secur
it
y
an
al
ysi
s
of
t
he
pr
i
m
aril
y
sel
ect
ed
cl
us
te
rh
ea
d.
The
ou
tc
om
e
of
the
seco
nd
a
ry
r
ule
-
set
is
a
fin
al
l
y
sel
ect
ed
secur
e
d
cl
us
te
rh
ea
d.
This
op
e
r
at
io
n
is
fo
ll
ow
e
d
by
con
st
ru
ct
in
g
the
desig
n
in
orde
r
to
i
nve
sti
gate
the
int
ensity
of
the
a
tt
acker
fo
ll
owe
d
by
ap
plyi
ng
t
his
ru
le
set
in
orde
r
to
ens
ur
e
pro
per
s
el
ect
ion
.
Finall
y,
the
a
dversa
r
y
node
is
ide
ntifie
d
and
is
updated
to
al
l
the
neig
hbori
ng
as
we
l
l
as
finall
y
to
com
plete
netwo
r
k
so
t
hat
al
l
the
com
m
un
ic
at
ion
process
gen
e
r
at
ed
to
an
d
from
su
ch
adv
e
rsar
y
co
uld
be
te
r
m
inate
d.
T
h
e
c
o
r
e
o
b
j
e
c
t
i
v
e
o
f
t
h
e
p
r
o
p
o
s
e
d
m
e
t
h
o
d
o
l
o
g
y
i
s
t
o
e
n
s
u
r
e
t
h
a
t
a
l
i
g
h
t
w
e
i
g
h
t
s
e
c
u
r
i
t
y
p
o
l
i
c
y
i
s
i
m
p
l
e
m
e
n
t
e
d
i
n
o
r
d
e
r
t
o
e
n
s
u
r
e
t
h
a
t
a
b
e
t
t
e
r
s
u
p
p
o
r
t
a
b
i
l
i
t
y
o
f
p
u
b
l
i
c
k
e
y
e
n
c
r
y
p
t
i
o
n
i
s
a
v
a
i
l
a
b
l
e
.
2.
ALGO
RITH
M
I
MPLEME
NTATIO
N
The
pri
m
e
pu
r
po
s
e
of
the
pr
opos
e
d
al
gorithm
is
to
offe
r
a
sec
ur
e
data
ag
gr
e
gatio
n
by
addressi
ng
the
secur
e
sel
e
ct
ion
of
cl
us
te
r
-
hea
d.
T
he
hypothesis
of
the
pro
po
se
d
al
gor
it
h
m
con
structi
on
is
carrie
d
out
on
the
fact
t
hat
a
cl
us
te
rh
ea
d
be
ars
sig
nifica
nt
and
val
uab
le
i
nfor
m
at
ion
as
com
par
ed
t
o
ot
her
m
e
m
ber
node
s.
Ther
e
f
or
e,
it
is
m
or
e
li
kely
that
cl
us
te
r
hea
ds
will
be
m
or
e
ta
r
geted
to
be
c
om
pr
om
is
ed
as
com
par
e
d
t
o
m
e
m
ber
node
s.
Hen
ce
,
the
com
plete
al
go
rithm
con
st
r
uctions
ar
e
c
arr
ie
d
out
t
o
protect
al
l
s
or
ts
of
com
m
un
ic
at
ion
or
i
gin
at
in
g
t
o
a
nd
f
r
om
the
cl
us
te
r
hea
d
in
WSN.
T
he
al
gorithm
ta
kes
the
i
nput
of
S
area
(S
im
ulati
on
area),
E
i
(initi
al
energy),
n
(se
nsors
),
p
x
,
y
(p
osi
ti
on
of
se
nsors
),
p
CH
(
pro
bab
i
li
ty
of
cl
us
te
r
-
heads)
,
and
n
ad
(num
ber
of
a
dv
e
rsa
r
y)
that
after
proces
sin
g
yi
eld
s
an
ou
tc
ome
of
nC
H
(se
cur
e
CH
).
T
he
ste
ps
include
d
i
n
t
he
prop
os
ed
alg
ori
thm
are
as fol
lows
:
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Ele
c &
C
om
p
En
g
IS
S
N:
20
88
-
8708
Multi
-
sta
ge
sec
ur
e cl
us
te
rh
e
ad selec
ti
on
us
i
ng d
isc
ret
e
ru
l
e
-
set
…
(
Tejas
hwini N.
)
4299
Algorithm for Selection of robust CH for s
ecure Data Aggregation
Input
: S
area
, E
i
,
n
, p
x,y
, p
CH
, n
ad
Output
: nCH
Start
1.
init
S
area
, E
i
,
n
, p
x,y
, p
CH
, p
ad
2. S
area
[b
x,y
, rand(n
x,y
)]
3. construct ϕ
P
, ϕ
S
// ϕ is Ruleset, P, S
-
primary/secondary
3.
For
i=1:n
//fuzzy+Active+dynamic
4. θ
2π
.
ar
b(
n)
5.
2
1
2
1
))
(
(
))
(
(
i
y
y
i
x
x
V
d
6.
For
j=1:n
7. N
non
f
1
(n, p
x,y
,
R
nn
)
8. vul
f
2
(n, p
x,y
)
9. vic
f
3
(p
x,y
,
N,
b
x,y
)
10. PO
1
ϕ
P
(E Nnon)
& SO
1
ϕ
s
(v
ul
,
vi
c,
d
CH
)
11. n
CH
arg
max
(GQ1):
12.
End
13.
End
End
The flo
ws of t
he
prop
os
ed
alg
or
it
hm
ic
s
t
e
p
s
are il
lustrate
d
as b
el
ow
:
2.1.
Prepar
at
i
on
of the si
mul
at
i
on are
a
T
h
e
a
l
g
o
r
i
t
h
m
i
n
i
t
i
a
l
i
z
e
s
a
l
l
t
h
e
i
n
p
u
t
p
a
r
a
m
e
t
e
r
s
(
L
i
n
e
-
1
)
a
n
d
p
e
r
f
o
r
m
s
d
e
p
l
o
y
m
e
n
t
o
f
a
l
l
t
h
e
s
e
n
s
o
r
n
o
d
e
s
i
n
r
a
n
d
o
m
o
r
d
e
r
i
.
e
.
r
a
n
d
(n
x
,
y
)
,
w
h
e
r
e
a
s
i
t
c
a
n
a
l
s
o
c
h
a
n
g
e
t
h
e
p
o
s
i
t
i
o
n
o
f
t
h
e
b
a
s
e
-
s
t
a
t
i
o
n
b
x
,
y
a
t
a
n
y
p
a
r
t
o
f
t
h
e
s
i
m
u
l
a
t
i
o
n
a
r
e
a
(
L
i
n
e
-
2
)
.
T
h
e
a
l
g
o
r
i
t
h
m
a
l
s
o
s
e
l
e
c
t
s
c
e
r
t
a
i
n
n
u
m
b
e
r
o
f
a
d
v
e
r
s
a
r
y
n
o
d
e
s
;
h
o
w
e
v
e
r
,
i
n
o
r
d
e
r
t
o
a
s
s
e
s
s
t
h
e
s
y
s
t
e
m
,
t
h
e
a
l
g
o
r
i
t
h
m
i
s
d
e
s
i
g
n
e
d
w
i
t
h
n
o
p
r
e
-
d
e
f
i
n
e
d
i
n
f
o
r
m
a
t
i
o
n
a
b
o
u
t
t
h
e
l
o
c
a
t
i
o
n
o
f
t
h
e
a
d
v
e
r
s
a
r
y
.
2.2.
Constr
ucti
on
of rule
-
se
t
The
pro
pose
d
syst
e
m
con
struc
ts
two
seq
ue
ntial
ru
le
set
t
hat
is
util
iz
ed
for
filt
erin
g
th
e
sel
ect
ion
process
of
the
secur
e
cl
us
te
r
he
ad.
T
he
fir
st
r
ule
-
set
ϕ
P
is
ab
ou
t
pr
im
ary
se
le
ct
ion
w
hile
second
r
ule
-
s
et
ϕ
S
is
about
sec
ondary
sel
ect
ion
crit
erio
n
of
the
cl
us
te
r
head
(Lin
e
-
3).
Co
ns
t
ru
ct
ion
of
bo
t
h
the
ru
le
-
s
et
are
ca
rr
ie
d
ou
t
us
i
ng trap
e
zoidal m
e
m
ber
sh
ip
fun
ct
io
n.
2.2.1.
Pri
mary rule
-
set
ϕ
P
The
al
gorithm
ta
kes
the
e
nerg
y
and
the
nu
m
ber
of
the
neig
hbor
as
an
input
par
am
et
er
to
the
ru
le
-
set
process
or
that offers
the outp
ut
of p
rim
ary
sel
ect
ed
cl
us
te
r
head.
T
he
c
ons
tructi
on o
f
the r
ule
-
set
f
or
in
puts
ar
e
carried
out
consi
der
in
g
lo
wer,
hig
he
r,
a
nd
m
edium
value
of
if,
wh
e
r
eas
in
f
eren
ci
ng
o
f
the
ou
tp
ut
is
carri
edout
by
m
ulti
ple
co
m
bin
at
ion
of
i
t
as
highli
gh
te
d
i
n
Fi
gure
2.
The
l
og
ic
of
t
his
r
ule
-
set
is
that
if
a
se
ns
or
node
bear
s
l
ow
e
r
r
esi
du
al
ene
r
gy
and
lo
we
r
ne
ighbor
no
des
,
tho
se
nodes
don’
t
s
uit
to
be
bec
om
e
s
tro
ng
cl
us
t
erh
ea
d
a
nd
he
nce
ne
ver
com
e
un
der
th
e
rad
ar
of
a
dv
e
rsar
y.
Ap
a
rt
from
secur
it
y
vi
ewpoint,
s
uc
h
weake
r
form
of
nodes
will
no
t
serv
e
the
purpose
of
bein
g
a
cl
us
t
erh
ea
d
owin
g
to
their
inca
pa
bili
ty
to
of
fer
rob
us
t
data
ag
gregati
on.
On
t
he
oth
er
ha
nd,
if
t
he
re
s
id
ual
en
erg
y
of
a
no
de
is
quit
e
high
a
nd
it
has
good
connecti
vity
w
it
h
oth
e
r
a
djac
ent
no
des,
tha
n
those
nodes
a
r
e
co
ns
ide
red
a
s
the
pote
ntial
cl
us
te
rh
ea
d.
It
is
al
so
i
m
per
at
ive
that
su
ch
cl
us
te
r
he
ad
will
li
kely
to
at
tract
the
at
te
ntion
of
t
he
ad
ver
sa
ry
as
if
su
ch
no
de
s
are
com
pr
om
ise
d
than
dis
per
si
on
of
the
m
al
i
ci
ou
s
at
ta
ck
w
il
l
be
m
or
e.
Hen
ce
,
th
e
pr
i
m
ary
ru
le
-
s
et
end
up
sel
ect
ing
the
m
os
t
su
it
able
c
luster
hea
d
tha
t
can
assist
s
in
data
aggreg
at
i
on
process
f
or
longer
durati
on
with
good
resid
ual e
nergy.
2.2.2.
Se
condar
y
r
ule
-
set
ϕ
s
This
ru
le
-
set
is
m
eant
fo
r
f
ur
t
her
filt
erin
g
the
sel
ect
io
n
process
of
the
secu
re
cl
ust
er
head
as
a
n
extensi
on
of
t
he
pri
m
ary
ru
le
-
set
.
Fig
ure
3
highli
gh
ts
t
ha
t
in
this
sta
ge,
the
proces
sor
ta
kes
thre
e
di
ff
e
ren
t
inputs
i.e.
vulnera
bili
ty
,
vicinit
y,
and
distance
.
All
these
par
am
et
ers
are
m
or
e
-
or
-
le
s
s
li
nk
ed
with
di
sta
nce
m
et
ric
i
tse
lf.
Vu
lne
rab
il
it
y
is
basical
ly
con
di
ti
on
w
hen
a
se
ns
or
no
de
is
in
a
distance
within
the
sen
sin
g
ran
ge
of
a
n
a
dv
e
rsary
wh
il
e
vicit
y
is
sa
m
e
distance
with
cl
os
es
t
distance
with
the
ad
ver
sa
ry
node.
O
n
the
othe
r
hand,
distance
is
basical
ly
a
Eucli
dea
n
dist
ance
betwe
en
t
wo
c
omm
un
icati
ng
cl
us
te
r
he
ad
(in
case
of
m
ul
ti
-
hop
com
m
un
ic
at
ion
only
).
Ac
cordin
g
t
o
t
his
final
ru
le
-
set
,
t
he
sa
fest
cl
us
te
rh
ea
d
will
be
that
node
w
hic
h
ha
s
lowe
r
val
ue
of
vu
l
ner
a
bili
ty
,
vicinit
y,
as
we
ll
as
distance.
It
sim
ply
infers
that
only
no
de
that
a
re
loc
at
ed
at
the f
a
rthest e
nd
from
the ad
ve
rsar
y a
re th
e
s
ecur
e
no
de
a
nd is m
or
e li
ke
to
b
e
sel
ect
ed
as
cl
us
te
rh
ea
d.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4296
-
4304
4300
P
r
i
m
a
r
y
S
e
l
e
c
t
i
o
n
P
r
o
c
e
s
s
E
n
e
r
g
y
N
u
m
b
e
r
o
f
N
e
i
g
h
b
o
r
P
r
i
m
a
r
y
S
e
l
e
c
t
e
d
C
H
L
o
w
M
e
d
i
u
m
H
i
g
h
t
r
a
p
m
f
V
e
r
y
s
m
a
l
l
S
m
a
l
l
R
a
r
e
l
y
s
m
a
l
l
M
e
d
i
u
m
s
m
a
l
l
M
e
d
i
u
m
M
e
d
i
u
m
l
a
r
g
e
V
e
r
y
l
a
r
g
e
R
a
r
e
l
y
l
a
r
g
e
N
o
n
e
t
r
a
p
m
f
F
igure
2. Co
nst
ru
ct
io
n of
pri
m
ary ru
le
-
set
S
e
c
o
n
d
a
r
y
S
e
l
e
c
t
i
o
n
P
r
o
c
e
s
s
V
i
c
i
n
d
i
s
t
F
i
n
a
l
l
y
S
e
l
e
c
t
e
d
C
H
L
o
w
M
e
d
i
u
m
H
i
g
h
t
r
a
p
m
f
V
e
r
y
s
m
a
l
l
S
m
a
l
l
R
a
r
e
l
y
s
m
a
l
l
M
e
d
i
u
m
s
m
a
l
l
M
e
d
i
u
m
M
e
d
i
u
m
l
a
r
g
e
V
e
r
y
l
a
r
g
e
R
a
r
e
l
y
l
a
r
g
e
N
o
n
e
v
u
l
n
e
r
a
b
t
r
a
p
m
f
Figure
3
.
Co
nst
ru
ct
io
n of
sec
onda
ry rule
-
set
2.3.
Assessin
g
in
te
nsity o
f ad
ver
sa
r
y
The
pro
pose
d
stud
y
co
ns
tr
uc
ts
the
adv
er
sar
y
scenario
wit
h
a
com
bin
at
i
on
of
i)
act
ive
at
ta
ck
and
ii
)
dynam
ic
state
of
node
.
Alt
houugh,
the
al
gorithm
is
equal
ly
capab
le
f
or
te
sti
fyi
ng
dif
f
eren
t
possible
at
ta
ck
scenari
o
an
d
diff
e
re
nt
discr
et
e
sta
te
s
of
node;
this
sce
nar
i
o
is
sel
ect
ed
f
or
a
naly
sis
as
this
is
the
m
os
t
chall
eng
i
ng
sc
enar
i
o
with
re
sp
ect
to
inte
nsi
ty
of
at
ta
ck
and
it
s
after
m
at
h
con
se
qu
ences.
T
he
al
gorith
m
consi
ders
al
l
th
e
nodes
prese
nt
in
the
sim
ulati
on
a
rea
(Line
-
3)
a
nd
im
ple
m
ents
a
sim
ple
fo
rm
ula
of
θ
(L
ine
-
4)
in
order
t
o
re
nder
ar
bitra
ry
ori
entat
ion
of
th
e
sensor
no
des
.
This
par
t
of
the
al
gorithm
i
m
ple
m
entat
ion
is
all
about
c
heck
i
ng
the
dista
nce
to
in
vestigat
e
the
pr
ese
nc
e
of
ad
ve
rsary
.
For
this
pur
pose,
t
he
al
gorithm
com
pu
te
s
the
vulne
rab
le
dista
nce
V
d
(Li
ne
-
5).
It
f
ur
t
her
pe
r
form
s
m
or
e
filt
erati
on
of
t
he
distance
on
the
basis
of
v
ul
ner
a
bili
ty
assessm
ent
us
ing
sim
ple
distance
-
based
l
ogic
.
F
or
al
l
the sen
s
or
n
odes (L
ine
-
6),
the p
r
opos
e
d
al
gorithm
appl
ie
s
m
ulti
ple
exp
li
ci
t
functi
on
s
in
orde
r
to
pe
rfor
m
this
assessm
ent.
The
al
gorith
m
firs
t
i
m
ple
m
ents
a
fu
nctio
n
f
1
(
x)
t
hat
ta
kes
the
i
nput
ar
g
um
ent
s
of
num
ber
of
nodes
(
n
),
po
s
it
ion
of
node
s
(p
x,
y
),
and
ra
nge
of
ne
ighbor
node
s
(R
nn
).
O
nly
the
sensors
w
ho
s
e
distance
valu
e
is
le
ss
than
or
eq
ual
to
range
of
neig
hbori
ng
node
is
co
ns
ide
red
as
the
nei
ghbo
rin
g
nodes
(Line
-
7).
T
he
nex
t
pa
rt
of
t
he
al
go
rithm
per
f
or
m
s
com
pu
ta
ti
on
of
the
vulne
ra
bi
li
t
y
m
e
tric
vul
con
sid
erin
g
sens
or
s
(
n
)
an
d
posit
ion
of
node
(
p
x,
y
)
(Line
-
8)
.
It
do
e
s
so
by
con
st
ru
ct
in
g
a
functi
on
f
2
(
x)
that
ca
rr
y
ou
t
est
im
ating
the
Eucli
dea
n
distance
bet
ween
the
norm
al
node
an
d
the
a
dv
ersa
ry
node
f
ol
lowe
d
by
s
umm
at
ion
of
al
l
the
est
im
a
te
d
di
sta
nce.
Th
e
ne
xt
pa
rt
of
the
al
gorithm
i
m
p
lem
ent
at
ion
pe
rfo
rm
s
com
pu
ta
ti
on
of
vicinit
yfact
or
(Li
ne
-
9).
The
al
gorith
m
us
es
a
f
un
ct
io
n
f
3
(
x)
that
c
om
pu
te
s
the
distance
betwee
n
th
e
re
gu
la
r
a
nd
m
ali
ci
ou
s
no
de
a
nd
c
hecks
if
t
he
y
are
locat
ed by cl
ose
ly
to
each
o
t
he
r.
2.4.
Ap
pl
ying rule
-
set
to resis
t a
dv
ers
ar
y
The
al
go
rithm
then
a
ssesses
the
pri
m
ary
op
ti
m
iz
ation
by
app
ly
in
g
th
e
pr
im
ary
ru
l
e
-
set
ϕ
P
on
init
ia
li
ed
energy
an
d
num
ber
of
neig
hbor
nodes
.
Acc
ord
ing
to
this
pr
i
m
ary
op
tim
iz
a
ti
on
,
a
re
gula
r
node
sh
oul
d
spo
ntan
eousl
y
dissipat
e
energy.
How
ever,
a
m
alici
ou
s
no
de
will
al
ways
try
to
sa
ve
m
axi
m
u
m
e
nergy
un
ti
l
a
nd
unle
s
s
it
has
not
init
ia
te
d
it
s
at
ta
ck.
It
will
m
ean
t
hat
if
a
m
al
iciou
s
node
ha
s
not
la
un
c
he
d
a
n
a
tt
ack,
it
is
no
t
feasi
bl
e
to
diff
e
re
ntiat
e
at
ta
cker
no
de
a
nd
norm
al
node
.
He
nce,
the
prese
nce
of
a
bnor
m
al
ly
hig
he
r
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Ele
c &
C
om
p
En
g
IS
S
N:
20
88
-
8708
Multi
-
sta
ge
sec
ur
e cl
us
te
rh
e
ad selec
ti
on
us
i
ng d
isc
ret
e
ru
l
e
-
set
…
(
Tejas
hwini N.
)
4301
a
m
ou
nt
of
e
ne
rg
y
will
be
one
of
the
i
nd
i
cat
ion
s
of
pr
e
sence
of
m
al
i
ci
ou
s
node
i
n
pr
im
ary
op
ti
m
iz
at
ion
process
.
Esta
bl
ishm
ent
of
com
m
un
ic
at
ion
with
s
uc
h
node
s
is
insta
nt
ly
abo
rted
af
te
r
this.
How
eve
r
,
the
al
gorithm
exten
ds
the
pr
i
m
ary
op
tim
izati
on
to
t
he
se
conda
ry
optim
iz
at
ion
in
orde
r
to
furthe
r
as
certai
n
about
the
ef
fici
ency
of
th
e
resist
ance
.
I
n
the
sec
onda
r
y
op
ti
m
iz
a
ti
on,
the
al
gorith
m
con
siders
a
pp
ly
in
g
seco
nd
a
ry
r
ule
-
set
ϕ
s
to
fi
nally
ensure
that
no
s
uch
vulne
ra
ble
no
de
is
sel
ect
ed
in
t
his
proces
s.
T
h
e
f
u
n
c
t
i
o
n
t
a
k
e
s
t
h
e
i
n
p
u
t
a
r
g
u
m
e
n
t
s
t
o
e
n
s
u
r
e
t
h
a
t
o
n
l
y
t
h
e
s
e
c
u
r
e
d
c
l
u
s
t
e
r
h
e
a
d
i
s
s
e
l
e
c
t
e
d
i
n
t
h
i
s
p
r
o
c
e
s
s
(
L
i
n
e
-
1
0
)
.
F
i
n
a
l
l
y
,
t
h
e
a
l
g
o
r
i
t
h
m
s
e
l
e
c
t
s
t
h
e
h
i
g
h
l
y
u
t
i
l
i
z
e
d
s
e
c
o
n
d
a
r
y
o
p
t
i
m
i
z
e
d
v
a
l
u
e
t
h
a
t
e
n
d
s
u
p
s
e
l
e
c
t
i
n
g
t
h
e
m
o
s
t
e
l
i
g
i
b
l
e
c
l
u
s
t
e
r
h
e
a
d
n
CH
(
L
i
n
e
-
1
1
)
.
2.5.
Log
ic
of iden
t
ific
at
io
n
an
d
r
esi
sta
n
ce
The
pro
posed
s
yst
e
m
app
li
es
a
uniq
ue
l
og
ic
o
f
ide
ntifyi
ng an
d
c
onform
ing
t
he
pr
ese
nce
o
f
m
alici
ou
s
node
a
nd
im
pl
e
m
ents
a
m
echan
ism
to
resist
any
form
of
intru
si
on.
The
i
de
ntific
at
ion
p
r
oc
ess
of
th
e
ad
ve
rsar
y
is
carried
out
in
dual
ste
ps.
I
n
the
first
ste
p
of
i
den
ti
ficat
io
n,
the
sen
s
or
pe
rfor
m
s
exch
a
ng
e
of
in
form
a
ti
on
i
n
the
f
or
m
of
be
acons
wit
h
eac
h
oth
e
r
that
al
s
o
bear
s
a
s
peci
fic
fiel
d
f
or
res
idu
al
e
nergy.
The
pro
posed
syst
e
m
assum
es
that
al
l
the
cl
us
te
r
heads
are
higher
de
gr
ee
of
com
m
un
ic
at
ion
sync
hro
noci
ty
with
each
ot
her
by
per
i
o
dic
e
xch
a
ng
e
of
beac
ons
a
m
ong
the
cl
ust
erh
ea
ds
durin
g
inter
-
cl
us
te
r
com
m
un
ic
at
ion
.
Accor
ding
to
thi
s
schem
e,
a
cl
us
t
er
hea
d
bears
al
l
the
authen
ti
cat
ed
inf
or
m
at
i
on
relat
e
d
to
it
s
associat
ed
m
e
m
ber
nodes
a
nd
this
will
cal
l
fo
r
e
ven
t
ually
m
on
it
or
in
g
al
l
the
r
eso
ur
ce
-
relat
ed
inf
or
m
at
ion
too.
E
ven
i
f
a
conve
ntion
al
T
DM
A
schem
e
is
assume
d
to
be
i
m
ple
m
ented
than
the
tim
e
fo
r
da
ta
fu
sio
n
as
w
el
l
as
agg
reg
at
ion
is
alm
os
t
fixed.
This
entai
ls
th
at
regular
node
s
spon
ta
neousl
y
dep
le
te
ene
r
gy
in
the
pro
gressi
ve
ste
p
of
data
ag
gr
e
gation
a
nd
hen
ce
i
n
this
proces
s,
if
the
re
is
a
pr
ese
nce
of
a
ny
node
t
ha
t
bear
s
a
bnorm
al
l
y
m
or
e
res
idu
al
ene
r
gy
th
an
it
is
le
ss
li
kely
that
su
ch
node
will
be
regular
node.
H
owev
er,
pr
ese
nce
of
s
uc
h
no
de
with
hi
gh
e
r
resid
ual
energy
cannot
be
us
e
d
to
c
on
cl
ud
e
that
the
node
i
s
a
m
al
iciou
s
on
e
a
nd
there
f
or
e
,
it
proceed
s
for
ne
xt
r
ound
of
check.
F
or
t
he
pur
po
se
of
c
onfirm
ing
the
presence
of
m
alici
ou
s
nodes
a
t
the
en
d
of
prel
i
m
inary
chec
king
sta
ge,
the
al
go
rithm
con
sider
s
m
ulti
ple
distance
-
base
d
pa
r
a
m
et
ers
e.g
.
vulne
rab
il
it
y
and
vicinit
y
par
a
m
et
ers
in
orde
r
to
car
r
y
ou
t
m
or
e
in
de
pth
i
nv
est
i
gation
a
bout
t
he
be
hav
i
our
of
t
he
sens
or
s
.
T
he
unde
rly
ing
pri
nc
iple
of
this
resist
a
nce
theo
ry
is
t
hat
a
m
alici
ou
s
node
will
not
la
uch
any
form
of
at
ta
ck
wh
e
n
it
j
oin
s
a
new
netw
ork.
At
the
sa
m
e
t
i
m
e,
it
will
neither
re
side
in
a
sam
e
networ
k
for
a
lon
ge
r
pe
rio
d
of
ti
m
e.
The
gain
of
the
m
al
ic
iou
s
node
is
on
ly
at
the
instance
wh
e
n
they
are
su
ccess
f
ul
in
their
at
tem
pt.
Fo
r
this
pur
po
se
,
the
ad
ve
rsar
y
will
be
r
eq
uire
d
to
in
cr
ease
it
s
at
ta
ckin
g
e
ve
nt
as
far
a
s
fea
sible.
T
he
nex
t
ste
p
is
t
o
c
hec
k
f
or
the
pr
ese
nce
of
inte
rm
i
tt
ent
com
m
un
ic
at
ion
li
nks,
w
hic
h
directl
y
dep
ic
ts
that
this
li
nk
le
a
ds
t
o
m
alici
ou
s
nodes
at som
e p
oi
nt.
Ther
e
f
or
e,
as
per
t
he
l
og
ic
of
the
pro
posed
al
gorit
hm
,
the
pr
e
sence
of
m
or
e
nu
m
ber
of
c
onsist
en
t
rem
nan
t
energ
y
is
a
direct
re
pr
ese
ntati
on
of
the
fact
that
t
he
re
is
a
m
al
ici
ou
s
no
de
at
the
end.
Howe
ver,
there
is
al
so
a
po
ssib
il
ity
that
it
ocu
ld
be
regular
node
.
In
s
uch
ca
se,
the
pr
i
or
hi
story
from
the
rout
in
g
ta
ble
will
be
check
e
d.
If
upon
c
heck
i
ng
it
is
fo
un
d
that
th
at
no
de
has
tra
ns
m
itted
m
any
data
in
past
an
d
sti
ll
i
t
retai
ns
m
or
e
energy
tha
n
it
is
a
posit
ive
in
dicat
ion
of
m
a
li
ci
ou
s
node
or
el
se
it
co
uld
be
regular
node
.
At
t
he
sam
e
tim
e,
if
the
nu
m
ber
of
distances
that
are
al
ways
increasing
in
it
s
siz
e
than
it
directl
y
dep
ic
st
that
there
is
a
sp
onta
ne
ous
sp
rea
d
of
at
ta
ck
w
hich
is
feas
ible
by
captur
i
ng
the
public
ke
ys.
Ther
e
fore,
it
is
i
m
per
at
iv
e
that
norm
al
senso
rs
will
al
ways
ha
ve
le
ss
num
ber
of
i
ncr
e
asi
ng
sp
at
ia
l
distanc
es
(as
it
will
drai
n
m
or
e
energ
y)
as
well
as
increa
s
ing
distance
a
m
on
g
dif
fer
e
nt
sens
or
s
.
O
n
t
he
ot
her
ha
nd,
it
is
le
ss
li
kel
y
that
adv
e
rsa
r
y
will
stop
afte
r
co
m
pr
omi
sing
fe
w
nodes
as
f
ai
r
chan
ces
a
r
e
there
to
increase
the
num
ber
of
at
ta
cks.
O
n
c
e
t
h
e
m
a
l
i
c
i
o
u
s
n
o
d
e
i
s
c
o
n
f
i
r
m
e
d
f
o
r
i
t
s
p
r
e
s
e
n
c
e
t
h
a
n
a
l
l
t
h
e
c
o
m
m
u
n
i
c
a
t
i
o
n
t
o
a
n
d
f
r
o
m
t
h
e
a
d
v
e
r
s
a
r
y
w
i
l
l
b
e
e
l
i
m
i
n
a
t
e
d
a
n
d
s
u
b
s
e
q
u
e
n
t
a
f
l
a
g
m
e
s
s
a
g
e
a
b
o
u
t
t
h
e
n
o
d
e
a
n
d
i
t
s
r
e
s
p
e
c
t
i
v
e
n
e
i
g
h
b
o
r
s
a
r
e
u
p
d
a
t
e
d
t
o
a
l
l
t
h
e
n
o
d
e
s
a
s
a
n
u
p
d
a
t
e
.
H
e
n
c
e
,
t
h
e
p
r
o
p
o
s
e
d
a
l
g
o
r
i
t
h
m
o
f
f
e
r
s
s
i
g
n
i
f
i
c
a
n
t
l
y
c
o
s
t
-
e
f
f
e
c
t
i
v
e
s
o
l
u
t
i
o
n
t
o
o
f
f
e
r
s
i
g
n
i
f
i
c
a
n
t
r
e
s
i
s
t
a
n
c
e
t
o
a
n
y
l
e
t
h
a
l
f
o
r
m
s
o
f
a
t
t
a
c
k
i
n
W
S
N
.
T
h
e
n
e
x
t
s
e
c
t
i
o
n
d
i
s
c
u
s
s
e
s
a
b
o
u
t
t
h
e
o
u
t
c
o
m
e
s
o
b
t
a
i
n
e
d
a
f
t
e
r
i
m
p
l
e
m
e
n
t
i
n
g
t
h
i
s
a
l
g
o
r
i
t
h
m
.
3.
RESU
LT
A
N
ALYSIS
This
sect
io
n
di
scusses
a
bout
t
he
outc
om
es
ob
ta
ined
a
fter
i
m
ple
m
enting
the
al
gorithm
discuss
e
d
in
pr
i
or
sect
ion.
The
c
om
plete
e
m
ph
asi
s
of
the
a
naly
sis
is
giv
e
n
to
t
he
m
ai
nly
two
pe
rfor
m
ance
scal
e
i.e.
thr
oughput
a
nd
e
nergy.
Scr
ipted
in
MA
T
LAB,
t
he
a
na
ly
sis
of
t
h
e
pro
posed
al
gori
thm
is
carried
out
consi
der
i
ng
500
-
1000
sens
ors
co
ns
ide
rin
g
la
rg
e
scal
e
ne
twork
of
a
re
a
1000x1
200
m
2
.
The
sens
ors
are
pro
gr
am
itica
lly
desig
ne
d
be
arin
g
the
sta
ndar
d
c
ha
recter
ist
ic
of
MEM
SI
C
nodes
al
ong
with
2500
bits
of
pack
et
an
d
0.5
Joule
s
of
ene
r
gy.
T
he
st
udy
ou
tc
om
e
of
th
e
pro
posed
sys
tem
is
com
par
ed
with
t
he
sta
nd
a
r
d
secur
it
y
protoc
ol
of
SecL
EA
CH
[35]
beca
use
this
pr
ot
oc
ol
is
kn
own
f
or
bo
t
h
it
s
secur
it
y
ben
efit
s
an
d
energy
conser
vation i
n
W
S
N.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4296
-
4304
4302
The
ou
tc
om
e
exh
i
bits
in
Fi
g
ures
4
a
nd
5
highli
ghts
th
at
propose
d
s
yst
e
m
of
fer
s
good
e
nergy
conser
vation
in
WSN.
A
cl
os
er
l
ook
i
nto
Fig
ure
4
hi
ghli
gh
ts
t
hat
pr
opos
e
d
syst
em
offer
s
go
od
ne
twork
li
fetim
e
as
there
are
go
od
num
ber
of
s
us
t
ai
nin
g
nodes
ov
e
r
inc
reasin
g
num
ber
of
si
m
ulati
on
rou
nd
s
as
co
m
par
ed
to
c
onve
ntion
al
Se
cLEAC
H
al
gor
it
h
m
.
The
pr
im
e
reason
be
hind
this
is
SecLEACH
us
es
a
ty
pical
encr
y
ption
m
e
chan
ism
that
us
es
recursive
f
un
ct
io
n
in
orde
r
to
ge
ner
at
e
th
e
secret
key
for
authe
ntica
ti
on.
T
his
ph
e
nom
eno
n
will
require
a
node
to
al
w
ay
s
hav
e
s
pec
ific
am
ou
nt
of
res
ources
to
carry
out
thi
s
ta
sk
.
More
ov
e
r,
the
placem
ent
of
the
base
sta
ti
on
is
an
oth
e
r
bigger
c
halle
nge
in
existi
ng
syst
e
m
that
re
su
lt
in
m
assive
traff
ic
convergin
g
us
ing
sin
gle
hop
m
ai
nly.
H
e
n
c
e
,
S
e
c
L
E
A
C
H
c
a
n
n
o
t
o
f
f
e
r
e
n
e
r
g
y
c
o
n
s
e
r
v
a
t
i
o
n
a
s
t
h
e
t
e
s
t
e
n
v
i
r
o
n
m
e
n
t
c
h
o
s
e
n
i
s
a
c
o
m
b
i
n
a
t
i
o
n
o
f
a
c
t
i
v
e
a
t
t
a
c
k
s
w
i
t
h
d
y
n
a
m
i
c
s
e
n
s
o
r
n
o
d
e
s
t
h
a
t
c
a
n
n
o
t
b
e
s
u
p
p
o
r
t
e
d
e
n
e
r
g
y
e
f
f
i
c
i
e
n
t
l
y
b
y
S
e
c
L
E
A
C
H
.
Fig
ure
6
discu
sses
the
com
par
at
ive
analy
sis
of
the
t
hroughp
ut
for
both
propose
d
an
d
SecLE
A
C
H
al
gorithm
.
The
ou
tc
om
e
sh
ow
s
that
Sec
LEAC
H
co
uldn’t
offer
s
uffi
ci
ent
thr
oughput
m
or
e
than
40
%
com
pleti
on
of
si
m
ulati
on
ro
un
ds
,
w
he
rea
s
propose
d
syst
e
m
of
fer
s
s
pontane
ously
increase
d
am
o
un
t
of
thr
oughput
ti
ll
the
90%
of
the
si
m
ulati
on
rounds
prov
i
ng
t
hat
pro
po
se
d
s
y
stem
of
fer
s
si
gn
i
ficant
thr
ou
ghput
perform
ance
al
ong
with
opti
m
al
secur
it
y.
Fig
ure
7
highl
igh
ts
that
pr
opos
e
d
syst
e
m
offer
s
si
gn
ific
a
nt
ly
le
s
s
energy
fluct
uation
as
c
om
par
ed
to
SecLE
A
CH.
I
ncr
ea
sed
fluctuati
on
in
energy
is
al
ways
li
nk
ed
with
la
ck
of
synch
ro
noci
ty
a
m
on
g
the
nodes
that
res
ults
in
fail
ure
of
an
ef
fecti
ve
data
tran
sm
iss
ion
as
well
as
non
-
su
pp
or
ta
bili
ty
of
any
form
of
energy
-
e
ff
ic
ie
nt
al
gorithm
s.
In
crease
d
e
ne
rgy
var
ia
nce
of
S
ecLEAC
H
is
c
ause
d
du
e
to
la
ck
of
s
ynch
ron
ou
s
as w
el
l
as
la
ck
o
f
su
pp
or
t
a
bili
ty
of
m
ulti
-
ho
p
c
omm
un
ic
at
ion
sch
em
e.
This result
s
in m
or
e d
e
gr
a
da
ti
on
of
e
ne
rg
y
but in a
h
i
gh
ly
interm
ittent w
ay
. On
the
o
t
he
r
ha
nd, t
he pr
opose
d sy
ste
m
o
ff
e
rs
increasin
g
e
ve
nts
of
dissem
i
nation
of
the
updates
t
hat
res
ults
in
exc
ha
nge
of
ne
arly
updat
e
d
data
e
ve
ryt
i
m
e
there
by
assist
ing
the
ot
her
s
ens
or
s
kn
ow
a
bout
t
he
e
ven
t
of
s
uccess
fu
l
data
t
ran
sm
issi
on
or
presen
ce
of
m
al
ic
iou
s
node
.
He
nce,
the
pro
po
se
d
syst
e
m
is
fo
und
t
o
offer
m
or
e
re
sist
ivit
y
againt
m
axi
m
u
m
fo
r
m
of
threats
with les
ser deg
ra
dation t
o
the
en
e
r
gy
consum
ption
a
m
on
g
the
sens
or no
des.
Figure
4
.
Com
par
at
ive
an
al
ys
is of al
ive
node
s
Figure
5
.
Com
par
at
ive
an
al
ys
is of resi
du
al
e
nergy
Figure
6
.
Com
par
at
ive
an
al
ys
is of th
rou
ghpu
t
Figure
7
.
Com
par
at
ive
an
al
ys
is of va
riance
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Ele
c &
C
om
p
En
g
IS
S
N:
20
88
-
8708
Multi
-
sta
ge
sec
ur
e cl
us
te
rh
e
ad selec
ti
on
us
i
ng d
isc
ret
e
ru
l
e
-
set
…
(
Tejas
hwini N.
)
4303
4.
CONCL
US
I
O
N
This
pa
per
has
discuss
e
d
that
identify
ing
a
m
al
ic
iou
s
node
is
no
t
at
al
l
an
easy
ta
sk
that
can
al
so
j
ust
ify
the
reas
on
be
hind
not
100%
fail
–
pro
ofness
a
bout
th
e
existi
ng
sec
uri
ty
app
r
oac
he
s
in
W
S
N.
The
log
ic
of
the
pro
pose
d
m
et
ho
d
cl
ai
m
s
that
th
ere
is
al
ways
a
com
m
on
and
a
ty
pi
cal
beh
a
viour
of
a
ny
ad
ver
sa
ry
node
,
wh
ic
h
sa
ves
t
he
tim
e to inv
est
igate
m
ult
iple at
ta
cks.
In t
his
reg
a
rd, the
en
e
rg
y ac
ts as
an e
ssentia
l res
our
ce for
al
l
the
senso
rs
wh
et
he
r
it
is
regular
no
de
or
m
al
ic
iou
s
node.
Th
e
pro
po
sed
syst
e
m
con
side
rs
dual
le
vel
of
filt
ering
the
pa
tt
ern
s
w
her
e
i
n
the
fi
rst
le
ve
l
an
eff
ic
ie
nt
c
lusate
rh
ea
d
is
sel
ect
ed
w
hile
in
the
seco
nd
le
vel
secur
it
y
c
har
e
ct
erist
ic
s
is
em
ph
asi
zed
m
or
e.
A
c
omm
on
track
of
reten
ti
on
of
ab
nor
m
al
residu
al
e
nergy
i
s
consi
der
e
d
as
on
e
of
the
c
riti
eria
of
m
alici
ou
s
node
wh
e
re
as
there
a
re
al
s
o
dual
c
hecks
to
co
nf
i
rm
this
fact.
The
sim
ulati
on
ou
tc
om
e
sh
ow
s
that
it
isp
racti
cal
ly
feasible
to
offer
good
le
vel
of
s
ecur
it
y
to
m
ajo
rity
of
at
ta
cks
as
it
of
f
ers
go
od
netw
ork
li
feti
m
e
a
nd
data
delive
ry
perform
ance
in
com
par
ison
t
o
existi
ng
sec
ure
an
d
energy
-
e
ff
ic
ie
nt
ap
pr
oach
es
.
REFERE
NCE
S
[1]
June
Jam
ric
h
Pa
rsons
,
“
New pe
r
spec
ti
v
es
on
co
m
pute
r
concept
s
2018,
”
Compr
e
hensiv
e
,
C
engag
e
Learning
,
201
7.
[2]
M.
S.
Afaqui
,
E.
Garc
ia
-
Vi
ll
eg
as
and
E.
Lopez
-
Aguile
r
a,
"IE
EE
8
02.
11ax:
Ch
al
l
e
nges
and
req
uir
e
m
ent
s
for
future
high
eff
ic
i
ency
W
iFi,
" i
n
I
EE
E
Wirel
ess Comm
unic
ati
ons
,
vo
l
.
2
4,
no
.
3
,
pp
.
130
-
137,
2017
.
[3]
A.
Z.
Yonis,
"P
erf
orm
anc
e
an
aly
s
is
of
IEE
E
802.
11ac
base
d
W
LAN
in
w
ire
l
ess
com
m
un
ic
a
ti
on
s
y
stems
,
"
Inte
rnational
Jo
urnal
of El
e
ct
ri
c
al
and
Comput
er
Engi
n
ee
ring
,
vo
l.
9
,
no
.
2
,
pp
.
11
31
-
1136,
2019
.
[4]
V.
Mus
al
e,
and
D.
Chaudha
r
i,
"
Chal
le
ng
es,
pro
t
ocol
s
and
ca
se
st
udie
s
in
design
o
f
rel
i
able
en
erg
y
eff
icien
t
wire
l
ess
sensor
net
works
,
"
4th
Inte
rnat
io
nal
Confe
renc
e
on
Adv
anc
ed
Computing
and
Comm
unic
ati
on
S
yste
ms
,
pp.
1
-
7
,
2017.
[5]
G
.
Sam
ara
,
and
M
.
Aljaidi,
"Eff
i
ci
en
t
en
erg
y
,
co
st
red
uc
ti
on,
and
QoS
base
d
rout
ing
proto
col
for
wire
le
ss
sensor
net
works
,
"
Inte
r
nati
onal
Journa
l
of
Elec
tri
cal
a
nd
Computer
Engi
nee
ring
(
IJECE)
,
v
ol.
9,
n
o.
1,
pp.
496
-
504
,
2019.
[6]
A.
Vij
,
and
V.
Sharm
a,
"S
ec
ur
ity
issues
in
m
ob
il
e
adhoc
n
et
work:
A
surve
y
p
ape
r
,
"
2016
Inte
rnati
onal
Confe
ren
c
e
on
Computing,
Comm
unic
ati
on
and
Aut
omat
ion
,
pp.
561
-
566,
20
16.
[7]
K.
Ramesh
Rao,
S.
N.
Ti
rum
al
a
Rao,
and
P.
Che
nna
Redd
y
,
"A
n
eff
ective
da
ta
pr
iva
c
y
m
ec
han
ism
through
sec
ur
e
sess
ion
ke
y
ex
c
hang
e
m
odel
for
MA
NET,
"
Inte
rnational
Journal
of
El
e
ct
ri
cal
an
d
Computer
Engi
nee
ring
,
v
ol.
8
,
n
o.
5
,
pp
.
3267
-
3277,
2018
.
[8]
G.
Stergi
opou
lo
s,
M.
Kandi
as
,
and
D.
Gri
tzali
s
,
"A
pproa
ch
ing
enc
r
y
pt
ion
throu
gh
complex
nu
m
ber
loga
ri
thms
,
"
2013
Inte
rnat
ion
al
Conf
ere
nce
o
n
Sec
uri
ty and
C
ryptography
,
pp
.
1
-
6,
2013.
[9]
J.
Chudzi
kie
wi
c
z,
J.
Furtak
,
an
d
Z.
Zi
elinski,
"S
ec
ure
protoc
o
l
for
wire
le
ss
comm
unic
at
ion
withi
n
int
ern
et
of
m
il
it
ar
y
thi
ngs,"
2015
IEEE
2nd
World
Forum on
Inte
rne
t
o
f
Thin
gs (
WF
-
IoT
)
,
pp.
508
-
513,
2015.
[10]
B.
Mba
rek
,
and
A.
Medde
b,
"En
erg
y
eff
ic
i
ent
se
cur
ity
pro
toc
o
ls
for
wire
l
ess
sensor
net
works
:
SP
INS
vs
Ti
n
y
Se
c,
"
2016
Inte
rnat
ion
al
Symposium o
n
Net
works,
Co
mputers and
Co
mm
unic
ati
ons
,
p
p.
1
-
4
,
2016
.
[11]
H.
Ha
y
ouni
,
M.
Ham
di
,
and
T
.
H.
Kim
,
"A
surv
e
y
on
enc
r
y
p
ti
o
n
sc
hemes
in
wi
rel
ess
sensor
n
etw
orks,"
2014
7t
h
Inte
rnational
Co
nfe
renc
e
on
Advance
d
So
ft
ware
Engi
ne
ering
and
Its
App
li
ca
ti
ons
,
pp.
39
-
43,
2014
.
[12]
M.
A.
Sim
pli
ci
o
,
et
a
l
.
,
"Com
par
ison
of
Authenticate
d
-
En
cr
y
ptio
n
sche
m
es
in
W
ire
l
ess
Sensor
N
et
works
,
"
2011
IEE
E
3
6th
Conf
ere
nce on
Loca
l Com
pute
r Ne
two
rks
,
pp.
450
-
457,
2011.
[13]
A
.
B
h
a
v
e
,
a
n
d
S
.
R
.
J
a
j
o
o
,
"
S
e
c
u
r
e
c
o
m
m
u
n
i
c
a
t
i
o
n
i
n
w
i
r
e
l
e
s
s
s
e
n
s
o
r
n
e
t
w
o
r
k
s
u
s
i
n
g
h
y
b
r
i
d
e
n
c
r
y
p
t
i
o
n
s
c
h
e
m
e
a
n
d
c
o
o
p
e
r
a
t
i
v
e
d
i
v
e
r
s
i
t
y
t
e
c
h
n
i
q
u
e
,
"
I
E
E
E
9
t
h
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
I
n
t
e
l
l
i
g
e
n
t
S
y
s
t
e
m
s
a
n
d
C
o
n
t
r
o
l
,
p
p
.
1
-
6
,
2
0
1
5
.
[14]
J.
Zha
ng
,
X.
T
ao,
H.
W
u
,
and
X.
Zha
ng
,
"S
e
cur
e
tr
ansm
ission
in
SW
IPT
-
Po
were
d
Two
-
W
a
y
un
truste
d
r
ela
y
net
works
,
"
IE
EE A
c
ce
ss
,
vo
l. 6, p
p.
10508
-
10519
,
2018.
[15]
C.
Yang,
e
t
al
.
,
"A
novel
dat
a
fu
sion
al
gorit
hm
t
o
combat
fal
se
d
at
a
in
jecti
on
at
t
a
cks
in
net
worke
d
rad
ar
s
y
st
ems
,
"
in
IE
EE Tr
ansacti
ons on
S
ignal
a
nd
Information Proce
ss
ing
ov
er
Net
works
,
vo
l. 4, no. 1, pp. 125
-
1
36,
2018
.
[16]
F.
Ti
an
,
et
al
.
,
"S
ec
recy
ra
te
o
pti
m
iz
ation
in
w
ire
le
ss
m
ult
i
-
h
op
full
duple
x
n
et
works
,
"
in
IE
EE
Acce
ss
,
vol
.
6,
pp.
5695
-
5704
,
2018.
[17]
M.
Huang,
B.
Y
u
,
and
S.
L
i,
"P
UF
-
Assiste
d
group
ke
y
d
istri
but
i
on
sche
m
e
for
software
-
def
ine
d
wire
le
ss
sensor
net
works
,
" i
n
IE
EE
Comm
unic
a
t
ions Le
tters
,
vol
.
22,
no.
2,
p
p.
40
4
-
407,
2018
.
[18]
F.
Al
-
Turj
m
an
,
et
al
.
,
"S
ea
m
le
s
s
ke
y
agr
ee
m
ent
fra
m
ework
for
Mobile
-
Sink
in
IoT
base
d
Clou
d
-
Cent
ri
c
sec
ur
e
d
publi
c
safe
t
y
sen
sor ne
tworks,"
i
n
IEEE Access
,
vol.
5
,
pp
.
24617
-
24631,
2017
.
[19]
J.
Zha
o
,
"Topo
l
ogic
a
l
prope
r
ti
es
of
sec
ur
e
wire
l
ess
sensor
net
w
orks
under
th
e
$
q$
-
Com
posite
ke
y
pre
d
istri
but
io
n
sche
m
e
with
unr
el
i
abl
e
li
nks
,
" i
n
IEE
E
/A
CM
Tr
an
sacti
ons on
N
etwor
ki
ng
,
vo
l. 25, no. 3, pp. 1789
-
1802,
2017
.
[20]
S.
Aiss
ani
,
M
.
Om
ar,
A.
T
ari
,
and
F.
Bou
akkaz,
"µ
KM
S:
M
icro
ke
y
m
an
agem
ent
s
y
st
em
for
W
SN
s,"
in
IE
T
Wirel
ess Se
nsor
Syste
ms
,
vol
.
8
,
no.
2
,
pp
.
87
-
97
,
2018.
[21]
R.
Cao,
"D
etec
t
ing
arb
it
r
ar
y
att
ac
ks
using
cont
i
nuous
sec
ure
d
side
informati
on
in
wire
le
ss
netw
orks,"
in
IEE
E
Ac
c
ess
,
vol
.
5
,
p
p.
25927
-
25945
,
2017.
[22]
S.
L.
Chen,
et
al
.,
"V
LSI
implem
ent
a
t
ion
of
a
Cost
-
Eff
icient
m
ic
r
o
cont
rol
unit
wi
th
an
as
y
m
m
et
ri
c
enc
r
y
pt
ion
for
wire
le
ss
bod
y
s
e
nsor ne
tworks,"
in
IE
EE A
c
ce
ss
,
vol.
5
,
pp
.
4077
-
4086,
2017
.
[23]
S.
I.
Chu,
Y
.
J.
Huang
,
and
W
.
C.
Li
n
,
"A
uthenticati
on
protocol
design
and
L
ow
-
Cost
ke
y
en
cr
y
p
ti
on
func
t
io
n
implementa
t
ion for wir
eless
sensor ne
tworks,"
in
IEE
E
Syste
ms
Jo
urnal
,
vol
.
11
,
n
o.
4
,
pp
.
2718
-
2
725,
2017
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4296
-
4304
4304
[24]
B.
Gopal
akr
ishn
an
,
and
M.
A.
Bhag
y
ave
n
i,
"A
nti
-
ja
m
m
ing
co
m
m
unic
at
ion
for
bod
y
area
n
et
w
ork
using
cha
o
tic
fre
quency
hoppi
ng,
" i
n
Healt
h
ca
re
Technol
og
y
L
et
t
ers
,
vol
.
4
,
no
.
6,
pp.
233
-
237,
2017.
[25]
S.
G.
Hong,
et
al
.
,
"G
ame
-
th
eor
et
i
c
m
odel
ing
of
bac
ksca
tt
er
wir
el
ess
sensor
netw
o
rks
under
smart
interfe
r
ence,"
in
IE
EE Comm
unic
ati
ons
Letters
,
vol
.
22
,
no
.
4
,
p
p.
804
-
807
,
201
8.
[26]
Z.
Li
,
H.
W
ang
,
and
H.
Fang
,
"G
roup
-
base
d
c
ooper
ation
on
s
y
m
m
et
r
ic
ke
y
g
ene
ra
ti
on
for
wi
rel
ess
bod
y
area
net
works
,
" i
n
IE
EE
In
te
rnet
of
Things
Journal
,
v
ol.
4
,
no
.
6
,
pp
.
1
955
-
1963,
2017
.
[27]
S.
Shin
,
and
T
.
Kw
on,
"Two
-
Fact
or
au
the
nt
icated
ke
y
agr
e
ement
supporting
unlinkabil
i
t
y
in
5g
-
i
nte
gra
te
d
wir
el
e
ss
sensor ne
tworks,
" i
n
I
EE
E
A
cc
ess
,
vol
.
6
,
pp
.
1122
9
-
11241,
2018
.
[28]
K.
Moara
-
Nkw
e, Q.
Shi,
G.
M.
L
ee
,
and
M.
H.
E
i
z
a, "A nove
l
ph
ysica
l la
y
e
r
sec
ur
e
ke
y
g
ene
r
at
ion
and
ref
r
eshm
en
t
sche
m
e
for
wir
eless
sensor ne
two
rks,"
in
I
EE
E
A
c
ce
ss
,
vol
.
6
,
pp
.
11374
-
11387,
2
018.
[29]
K.
A.
Shim
,
"
BAS
IS:
A
Prac
ti
c
al
Multi
-
Us
er
broa
dca
st
aut
h
ent
i
ca
t
ion
sche
m
e
in
wire
le
ss
sensor
net
works,
"
in
IE
EE Tr
ansacti
ons on
In
formation Forensic
s a
nd
Sec
uri
ty
,
vol
.
12,
no
.
7
,
pp
.
15
45
-
1554,
2017
.
[30]
Z.
Sun,
Y.
Xu,
G.
Li
ang
,
and
Z.
Zhou,
"A
n
int
rusion
det
e
c
ti
on
m
odel
for
wire
le
ss
sensor
net
works
with
an
improved
V
-
Dete
c
tor al
gori
th
m
,
" i
n
IE
EE Se
n
sor
s J
ourn
al
,
vol
.
18
,
no
.
5
,
pp
.
1
971
-
1984,
2018
.
[31]
L.
M.
L
.
Oliv
ei
r
a,
et
a
l
.
,
"N
et
w
ork
admiss
ion
c
ontrol
solut
ion
f
or
6LoWP
AN
net
works
base
d
o
n
s
y
m
m
et
ric
k
e
y
m
ec
hani
sm
s,"
in
IEEE
Tr
ansactions
on
Industria
l
Informati
cs
,
vo
l.
12
,
no
.
6
,
pp
.
2
186
-
2195,
2016
.
[32]
C.
M.
Pint
ea,
P.
C.
Pop
,
and
I.
Z
el
in
a,
"D
enial
jam
m
ing
at
ta
cks
o
n
wire
le
ss
senso
r
net
work
using
sensiti
ve
age
nts
,
"
in
Logic
Journal
of the
IGPL
,
vo
l
.
24
,
no
.
1
,
pp
.
9
2
-
103,
2016
.
[33]
G.
Han,
X.
Li,
J.
Jiang,
L
.
Shu
,
a
nd
J.
Ll
ore
t
,
"Int
rusion
det
ection
al
gorit
hm
base
d
o
n
nei
ghbor
info
rm
at
ion
against
sinkhole
at
t
ac
k
i
n
wire
l
ess sensor ne
tworks,"
in
T
he
Computer
Jo
urnal
,
vol
.
58
,
n
o.
6
,
pp
.
1280
-
1
292,
2015
.
[34]
Te
j
ashwini
N,
D.
R.
Shashikum
ar
,
and
Sat
y
an
aray
an
R
edd
y
K
,
"M
obil
e
comm
unic
a
ti
on
sec
ur
ity
using
Gali
os
Fiel
d
in
el
l
ip
tic
cur
v
e
Cr
y
ptogr
aph
y
,
"
I
nte
rnational
Co
nfe
renc
e
on
Eme
rging
Re
search
i
n
El
e
ct
ronics,
C
omputer
Sci
en
c
e
and
Technol
og
y
,
pp.
251
-
256,
20
15.
[35]
L.
B
.
Oliv
ei
r
a,
et
al
.
,
"S
ecL
EACH
-
A
ra
ndom
ke
y
distr
ibut
ion
solu
ti
on
for
sec
ur
ing
cl
uster
ed
sensor
net
works
,
"
F
if
th
IEE
E
Inte
rnat
io
nal
Symposium
on
Net
work
Computing
and
Appli
cat
ions
,
pp.
145
-
154,
2006
.
BIOGR
AP
H
I
ES
OF
A
UTH
ORS
T
e
j
a
s
h
w
i
n
i
N
.
,
sh
e
h
a
s
c
o
m
p
l
e
t
e
d
h
e
r
B
.
E
f
r
o
m
S
V
C
E
,
B
e
n
g
a
l
u
ru
K
a
r
n
a
t
a
k
a
a
n
d
M
.
T
e
c
h
i
s
f
r
o
m
D
r
.
A
I
T
,
B
e
n
g
a
l
u
r
u
,
K
a
r
a
n
a
t
a
k
a
,
s
h
e
h
a
v
i
n
g
s
i
x
ye
a
r
s
o
f
t
e
a
c
h
i
n
g
a
n
d
r
e
s
e
a
r
c
h
e
x
p
e
r
i
e
n
c
e
i
n
r
e
s
p
e
c
t
i
v
e
e
n
g
i
n
e
e
r
i
n
g
c
o
l
l
e
g
e
s
u
n
d
e
r
Visvesvara
ya
Te
chno
logi
c
al
Univer
sit
y
,
Bel
ag
avi
,
Karn
a
ta
ka
,
India.
Her
int
ere
st
include
s
Digit
al
image
comm
unic
at
ion
,
W
ire
le
ss
comm
unic
at
ion,
W
ire
le
ss
sensor
net
work
and
Opera
t
ing
s
y
stem.
Curre
ntly
she
i
s
pursuing
her
rese
ar
ch
for
PhD
under
Vis
vesva
ra
y
a
Tech
nologi
c
al
Unive
rsit
y
,
Belagav
i,
Karna
ta
k
a.
She
has
publ
ishe
d
her
work
in
va
rious
interna
t
ion
al
conf
er
enc
es
a
nd
journals.
D
.
R
.
Sh
as
hi
Kumar,
Curre
ntll
y
working
as
a
Profess
or
and
H
OD
,
Depa
rtment
of
CS
E,
Cambridge
Insti
tut
e
of
Technol
og
y
,
Bengaluru,
Karna
ta
k
a,
Ind
ia
.
He
has
m
ore
tha
n
2
9
working
in
v
ar
ious
ca
p
ac
i
ti
es
.
He
has
More
tha
n
20
Rese
arc
h
Pap
ers
(Nati
on
al
and
Inte
rna
ti
ona
l)
i
n
his
cre
dit
a
nd
has
cha
ire
d
nat
iona
l
and
int
ern
ationa
l
conf
ere
n
ce
s.
He
has
publi
sh
e
d
10
rese
arc
h
p
a
per
s
in
r
efe
r
ee
d
Inte
rna
ti
ona
l
T
e
chni
c
al
Journa
ls
with
good
Im
pac
t
factor.
His
rese
arc
h
int
ere
st
area
is
Digit
al
I
m
age
Proce
ss
ing,
Com
pute
r
Networks
-
Specializa
t
ion
Mic
rop
roc
essors
,
Dat
a M
ini
ng,
and
Neu
ral
Ne
tworks.
K
.
S
atyana
r
ayana
Reddy
,
Curre
ntl
l
y
work
i
ng
as
a
Profess
or
and
HO
D,
Depa
rtment
of
ISE,
Cambridge
Instit
ute
of
Tech
nolog
y
,
Beng
al
u
ru,
Karna
ta
ka
,
I
ndia
.
He
has
m
ore
tha
n
2
5
y
e
ars
of
expe
rience
in
acade
m
ics
in
the
fie
ld
of
Com
pute
r
Scie
nce
.
He
has
m
ore
tha
n
25
Resea
rch
Pap
ers
(Nati
ona
l
and
Inte
rna
ti
ona
l)
in
his
cre
di
t
and
has
cha
ir
ed
na
tional
an
d
int
ern
at
ion
al
co
nfe
ren
c
es.
De
li
v
ere
d
Ke
y
no
te
a
ddre
ss
in
few
nat
ion
al
l
evel
c
onfe
ren
c
es.
His
are
a
of
i
nte
rst
is
Artif
i
ci
a
l
Intelli
g
ence
and
Robot
ics
,
Com
pute
r
Networks,
Data
Com
m
unic
ations,
Softwa
re
Eng
ine
e
ring,
The
or
et
i
cal
C
om
pute
r
Scie
n
c
e,
W
ir
el
ess
Sensor Net
works
.
Evaluation Warning : The document was created with Spire.PDF for Python.