Skip to main content

A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

  • 1699 Accesses

Abstract

In Wireless Sensor Networks (WSNs), co-operation among sensor nodes plays a significant role for reliable data delivery by prolonging the lifetime of the network. Taking this aspect into account, a Pareto Survivor Function based Cluster Head Selection Mechanism (PSFCHSM) is proposed for electing the new cluster head under selfish attack. In this approach, the detection of selfish attack is achieved through a conditional probabilistic approach which monitors events that purely depends only on the continuous network parameters. The proposed strategy not only identifies the selfish attack in sensor networks but also elects a new sensor node as a rehabilitative Cluster Head (CH) based on Pareto Survivor Function (PSF). The preeminence of the proposed approach is evaluated through evaluation parameters like Packet Delivery Ratio (PDR), Energy Consumption Rate and Throughput by varying the number of sensor nodes and the transmission range. Further, the incorporation of this conditional survivability co-efficient mechanism detects and mitigates selfish nodes at a rapid rate of 32 % than the benchmark mechanisms like Fuzzy Ant Colony Optimization Routing (FACOR) and Genetic Algorithm Inspired Routing Protocol (GROUP) considered for comparison. The proposed approach not only isolates the selfish nodes that causes Denial of Service (DoS) attack but also reduces the cost incurred in communication. Furthermore, the simulation results show that PSFCHSM outperforms GROUP and FACOR by enhancing the network lifetime by 28 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, K., Abu-ghazaleh, N., Kang, K.D.: Location verification and trust management for resilient geographic routing. J. Parallel Distrib. Comput. 67(2), 215–228 (2007)

    Article  MATH  Google Scholar 

  2. Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.J.: A group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), 1698–1712 (2000)

    Article  Google Scholar 

  3. Komathy, K., Narayanasamy, P.: Trust-AODV routing against selfishness. J. Netw. Comput. Appl. 31(4), 446–471 (2008)

    Article  Google Scholar 

  4. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. 4(3), 1–37 (2008)

    Article  Google Scholar 

  5. Momani, M., Challa, S.: Bayesian fusion algorithm for interfering trust in WSN. J. Netw. 5(7), 123–131 (2010)

    Google Scholar 

  6. Ozedemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 3(1), 3941–3953 (2008)

    Article  Google Scholar 

  7. Alzaid, H., Foo, E., Nieto, J.: RSDA: Reputation-based secure data aggregation in wireless sensor networks. Int. Conf. Parallel Distrib. Appl. Technol. 1(1), 456–462 (2008)

    Google Scholar 

  8. Taghikhaki, Z., Meratnia, N., Havinga, P.J.: Energy efficient trust based aggregation in WSN. In: INFOCOM WKSHPS 2011, vol. 1, no. 1, pp. 584–589 (2011)

    Google Scholar 

  9. Boukerche, A., Ren, Y.: A trust based security system for ubiquitous and pervasive computing. Comput. Commun. 3(18), 189–197 (2008)

    Google Scholar 

  10. Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5), 1493–1510 (2010)

    Article  Google Scholar 

  11. Hongjun, D., Zhiping, J., Xiaona, D.: An entropy based trust modeling and evaluation for wireless sensor networks. In: International Conference on Embedded Software systems, vol. 1, no. 1, pp. 124–132 (2008)

    Google Scholar 

  12. Luo, J., Liu, X., Fan, M.: A trust model based on fuzzy recommendations for MANET. Comput. Netw. 5(3), 2396–2407 (2009)

    Article  Google Scholar 

  13. Agah, A., Das, S.K., Basu, K.: A game theory based approach for security in WSN. In: IEEE International Conference on Performance, Computing and Communication, vol. 1, no. 1, pp. 259–263 (2005)

    Google Scholar 

  14. Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun. 1(4), 660–670 (2002)

    Article  Google Scholar 

  15. Amiri, E., Keshavarz, H., Alizadeh, M., Zamani, M., Khodadadi, T.: Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization. Int. J. Distrib. Sensor Netw. 2014, 17 (2014). Article ID 768936

    Google Scholar 

  16. Chakraborty, A., Mitra, S.K., Naskar, M.K.: A Genetic algorithm inspired routing protocol for wireless sensor networks. Int. J. Comput. Intell. Theor. Pract. 6(1), 1–8 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to PL. Rajarajeswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rajarajeswari, P., Karthikeyan, N.K. (2015). A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics