A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks

  • Guangsong Yang
  • Xin-Wen WuEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 258)


Most applications based on wireless sensor networks (WSN) have devices with constraints of limited energy and computational/storage capabilities. The traditional security mechanisms are not desirable to these applications. A lightweight security and energy-efficient clustering protocol was proposed in this paper to solve the security problem in the clustering-based sensor networks. Firstly, a lightweight security algorithm is proposed to meet the security requirements, which reduces the communication overload by using the transmission key index. Secondly, in the process of clustering, the base station (BS) and cluster head (CH) use lightweight authentication procedure to verify the identities hierarchically, to reduce the risk of attacks from malicious nodes posing as BS or CH. Thirdly, the proposed protocol is analyzed in the aspects of security and energy consumption. Simulation results show that the proposed protocol not only enhances the network security but also improves the energy efficiency.


Lightweight security Energy-efficient protocol Clustering WSN 



This research is supported by Science Foundation of Fujian Province (No. 2015J01267), Training Program of FuJian Excellent Talents in University.


  1. 1.
    Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference System Sciences, pp. 10–15 (2000)Google Scholar
  2. 2.
    Rahayu, T.M., Lee, S.G., Lee, H.J.: Survey on LEACH-based security protocols. In: Advanced Communication Technology (ICACT), pp. 304–309 (2014)Google Scholar
  3. 3.
    Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500–528 (2006)CrossRefGoogle Scholar
  4. 4.
    Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005). Scholar
  5. 5.
    Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLEACH-A random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, pp. 145–154 (2006)Google Scholar
  6. 6.
    El_Saadawy, M., Shaaban, E.: Enhancing S-LEACH security for wireless sen-sor networks. In: 2012 IEEE International Conference on Electro/Information Technology (EIT), pp. 1–6 (2012)Google Scholar
  7. 7.
    Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: A secure lightweight texture encryption scheme. In: Huang, F., Sugimoto, A. (eds.) PSIVT 2015. LNCS, vol. 9555, pp. 344–356. Springer, Cham (2016). Scholar
  8. 8.
    Paverd, A.J., Martin, A.P.: Hardware security for device authentication in the smart grid. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 72–84. Springer, Heidelberg (2013). Scholar
  9. 9.
    Wu, X.-W., Yang, E.-H., Wang, J.: Lightweight security protocols for the internet of things. In: Proceedings of the 28th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2017), Montreal, Canada, 8–13 October 2017Google Scholar
  10. 10.
    Yang, E.H., Wu, X.-W.: Information-theoretically secure key generation and management. In: Proceedings of 2017 IEEE International Symposium on Information Theory, pp. 1529–1533 (2017)Google Scholar
  11. 11.
    Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Jimei UniversityXiamenChina
  2. 2.Griffith UniversityGold CoastAustralia

Personalised recommendations