JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Dahane, Amine; Berrached, Nasr-Eddine; Loukil, Abdelhamid;
  PDF(new window)
 Abstract
In this paper, we present a virtual laboratory platform (VLP) baptized Mercury allowing students to make practical work (PW) on different aspects of mobile wireless sensor networks (WSNs). Our choice of WSNs is motivated mainly by the use of real experiments needed in most courses about WSNs. These experiments require an expensive investment and a lot of nodes in the classroom. To illustrate our study, we propose a course related to energy efficient and safe weighted clustering algorithm. This algorithm which is coupled with suitable routing protocols, aims to maintain stable clustering structure, to prevent most routing attacks on sensor networks, to guaranty energy saving in order to extend the lifespan of the network. It also offers a better performance in terms of the number of re-affiliations. The platform presented here aims at showing the feasibility, the flexibility and the reduced cost of such a realization. We demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.
 Keywords
Clustering;Energy Efficiency;Practical Work;Security Attacks;Virtual labs;Wireless Sensor Networks;
 Language
English
 Cited by
 References
1.
K. Wong, T. Wolf, S. Gorinsky, and J. Turner, "Teaching experiences with a virtual network laboratory," ACM SIGCSE Bulletin, vol. 39, no. 1, pp. 481-485, 2007. crossref(new window)

2.
T. H. Hai, E. N. Huh, and M. Jo, "A lightweight intrusion detection framework for wireless sensor networks," Wireless Communications and Mobile Computing, vol. 10, no. 4, pp. 559-572, 2010.

3.
E. N. Huh and T. H. Hai, Lightweight Intrusion Detection for Wireless Sensor Networks. Rijeka, Croatia : INTECH Open Access Publisher, 2011.

4.
Omnet official site [Online], Available: http://www.omnetpp.org.

5.
Castalia official site [Online]. Available: https://castalia.forge.nicta.com.au/index.php/en/index.html.

6.
The Network Simulator (ns-2) [Online]. Available: http://www.isi.edu/nsnam/ns.

7.
OPNET official site [Online]. Available: http://www.riverbed.com/products/performance-management-control/opnet.html?redirect=opnet.

8.
Tcl SourceForge Project [Online]. Available: http://tcl.sourceforge.net/.

9.
D. Mechta, S. Harous, M. Djoudi, and A. Douar, "A collaborative learning environment for a biology practical work," in Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS2010), Paris, 2010, pp. 389-394.

10.
M. Chatterjee, S. K. Das, and D. Turgut, "WCA: a weighted clustering algorithm for mobile ad hoc networks," Cluster Computing, vol. 5, no. 2, pp. 193-204, 2002. crossref(new window)

11.
W. Choi and M. Woo, "A distributed weighted clustering algorithm for mobile ad hoc networks," in Proceedings of Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), Guadeloupe, French Caribbean, 2006, pp. 73-73.

12.
A. Zabian, A. Ibrahim, and F. Al-Kalani, "Dynamic head cluster election algorithm for clustered Ad-Hoc networks," Journal of Computer Science, vol. 4, no. 1, pp. 42-50, 2008. crossref(new window)

13.
M. Chawla, J. Singhai, and J. L. Rana, "Clustering in mobile ad hoc networks: a review," International Journal of Computer Science and Information Security, vol. 8, no. 2, pp. 293-301, 2010.

14.
S. Mehta, P. Sharma, and K. Kotecha, "A survey on various cluster head election algorithms for MANET," in Proceedings of 2011 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, 2011, pp. 1-6.

15.
H. Kim, "An efficient clustering scheme for data aggregation considering mobility in mobile wireless sensor networks," International Journal of Control and Automation, vol. 6, no. 1, pp. 221-234, 2013.

16.
M. Chatterjee, S. K. Das, and D. Turgut, "A weight based distributed clustering algorithm for mobile ad hoc networks," in Proceedings of the 7th International Conference on High Performance Computing (HiPC2000), Bangalore, India, 2000, pp. 511-521.

17.
R. Agarwal, R. Gupta, and M. Motwani, "Review of weighted clustering algorithms for mobile ad hoc networks," Computer Science & Telecommunications, vol. 33, no. 1, pp. 71-78, 2012.

18.
A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, no. 14, pp. 2826-2841, 2007. crossref(new window)

19.
K. A. Darabkh, S. S. Ismail, M. Al-Shurman, I. F. Jafar, E. Alkhader, and M. F. Al-Mistarihi, "Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 2068-2080, 2012. crossref(new window)

20.
V. Geetha, P. V. Kallapur, and S. Tellajeera, "Clustering in wireless sensor networks: performance comparison of LEACH & LEACH-C protocols using NS2," Procedia Technology, vol. 4, pp. 163-170, 2012. crossref(new window)

21.
Y. Wang, X. Wu, J. Wang, W. Liu, and W. Zheng, "An OVSF code based routing protocol for clustered wireless sensor networks," International Journal of Future Generation Communication and Networking, vol. 5, no. 3, pp. 117-128, 2012.

22.
E. Ekici, Y. Gu, and D. Bozdag, "Mobility-based communication in wireless sensor networks," IEEE Communications Magazine, vol. 44, no. 7, pp. 56-62, 2006.

23.
J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol. 7, no. 1, pp. 32-48, 2005. crossref(new window)

24.
B. Sun, C. Gui, Y. Song, and C. Hu, "Stable clusterhead selection algorithm for ad hoc networks," International Journal of Future Generation Communication and Networking, vol. 6, no. 3, pp. 95-105, 2013.

25.
I. I. Er and W. K. G. Seah, "Mobility-based d-hop clustering algorithm for mobile ad hoc networks," in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, 2004, pp. 2359-2364.

26.
T. Kavitha and D. Sridharan, "Security vulnerabilities in wireless sensor networks: a survey," Journal of Information Assurance and Security, vol. 5, no. 1, pp. 31-44, 2010.

27.
A. Dahane, N. Berrached, and B. Kechar, "Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks," Procedia Computer Science, vol. 34, pp. 63-70, 2014. crossref(new window)

28.
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002. crossref(new window)

29.
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network (SASN2004), Washington, DC, 2004, pp. 66-77.

30.
I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Proceedings of International Conference on Dependable Systems and Networks (DSN2005), Yokohama, Japan, 2005, pp. 612-621.

31.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, 2000, pp. 255-265.

32.
K. Benahmed, H. Haffaf, and M. Merabti, "Monitoring of wireless sensor networks," in Sustainable Wireless Sensor Networks, W. Seah and Y. K. Tan, Eds. Rijeka, Croatia: InTech, 2010.

33.
C. Hsin and M. Liu, "Self-monitoring of wireless sensor networks," Computer Communications, vol. 29, no. 4, pp. 462-476, 2006. crossref(new window)

34.
Y. Yu and L. Zhang, "A secure clustering algorithm in mobile ad hoc networks," in Proceedings of 2012 IACSIT Hong Kong Conferences (IPCSIT vol. 29), 2012, pp. 73-77.

35.
X. Liu, "A survey on clustering routing protocols in wireless sensor networks," Sensors, vol. 12, no. 8, pp. 11113-11153, 2012. crossref(new window)

36.
S. Taneja and A. Kush, "A Survey of routing protocols in mobile ad hoc networks," International Journal of Innovation, Management and Technology, vol. 1, no. 3, 279-285, 2010.

37.
C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 234-244, 1994. crossref(new window)

38.
A. P. R. da Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, Canada, 2005, pp. 16-23.

39.
M. S. Islam and S. A. Rahman, "Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches," International Journal of Advanced Science and Technology, vol. 36, no. 1, pp. 1-8, 2011.

40.
S. Marchesani, L. Pomante, M. Pugliese, and F. Santucci, "A middleware approach to provide security in IEEE 802.15. 4 wireless sensor networks," in Proceedings of International Conference on Mobile Wireless Middleware, Operating Systems and Applications (Mobilware), Bologna, Italy, 2013, pp. 85-93.

41.
H. Ghamgin, M. S. Akhgar, and M. T. Jafari, "Attacks in Wireless Sensor Network," Journal of Applied Sciences Research, vol. 7, no. 7, pp. 954-960, 2011.

42.
D. Martins and H. Guyennet, "Security in wireless sensor networks: a survey of attacks and countermeasures," International Journal of Space-Based and Situated Computing, vol. 1, no. 2, pp. 151-162, 2011. crossref(new window)

43.
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003. crossref(new window)

44.
A. Sheth, C. Hartung, and R. Han, "A decentralized fault diagnosis system for wireless sensor networks," in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, 2005.

45.
I. Khalil, S. Bagchi, N. F. Shroff, "MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, 2008. crossref(new window)

46.
S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, "Detecting selective forwarding attacks in wireless sensor networks using support vector machines," in Proceedings of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP2007), Melbourne, Australia, 2007, pp. 335-340). IEEE.

47.
S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Troy, New York, Technical Report 05-07, 2005.

48.
P. Berwal, "Security in wireless sensor networks: issues and challenges," International Journal of Engineering and Innovative Technology, vol. 3, no. 5, pp.192-198, 2013.

49.
W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. Harlow: Pearson Education, 2010.

50.
A. S. K. Pathan, H. W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT2006), Phoenix Park, Korea, 2006, pp. 1048-1054.

51.
R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y. J. Song, "Trust management problem in distributed wireless sensor networks," in Proceedings of 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Sydneyt, 2006, pp. 411-414.

52.
A. H. Hussein, A. O. Abu Salem, and S. Yousef, "A flexible weighted clustering algorithm based on battery power for Mobile Ad hoc Networks," in Proceedings of IEEE International Symposium on Industrial Electronics (ISIE2008), Cambridge, UK, 2008, pp. 2102-2107.

53.
C. Li, Y. Wang, F. Huang, and D. Yang, "A novel enhanced weighted clustering algorithm for mobile networks," in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'09), Beijing, China, 2009, pp. 1-4.

54.
S. Soro and W. B. Heinzelman, "Cluster head election techniques for coverage preservation in wireless sensor networks," Ad Hoc Networks, vol. 7, no. 5, pp. 955-972, 2009. crossref(new window)

55.
M. Lehsaini, H. Guyennet, and M. Feham, "An efficient cluster-based self-organisation algorithm for wireless sensor networks," International Journal of Sensor Networks, vol. 7, no. 1, pp. 85-94, 2010. crossref(new window)

56.
K. Benahmed, M. Merabti, and H. Haffaf, "Distributed monitoring for misbehaviour detection in wireless sensor networks," Security and Communication Networks, vol. 6, no. 4, pp. 388-400, 2013. crossref(new window)