Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm

Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm

Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil
Copyright: © 2016 |Volume: 5 |Issue: 1 |Pages: 30
ISSN: 2155-6261|EISSN: 2155-627X|EISBN13: 9781466693104|DOI: 10.4018/IJWNBT.2016010105
Cite Article Cite Article

MLA

Dahane, Amine, et al. "Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm." IJWNBT vol.5, no.1 2016: pp.73-102. http://doi.org/10.4018/IJWNBT.2016010105

APA

Dahane, A., Berrached, N., & Loukil, A. (2016). Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm. International Journal of Wireless Networks and Broadband Technologies (IJWNBT), 5(1), 73-102. http://doi.org/10.4018/IJWNBT.2016010105

Chicago

Dahane, Amine, Nasr-Eddine Berrached, and Abdelhamid Loukil. "Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm," International Journal of Wireless Networks and Broadband Technologies (IJWNBT) 5, no.1: 73-102. http://doi.org/10.4018/IJWNBT.2016010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Clustering approaches for mobile wireless sensor networks (WSNs) tend to extend the battery life of the individual sensors and the network lifetime. Taking into account the mobility of the network, a powerful mechanism to safely elect a cluster head is a challenging task in many research works. As a proposed technique to deal with such problem, the approach based on the computing of the weight of each node in the network is chosen. This paper is intended to propose a new algorithm called “S-WCA” for safety of mobile sensor networks based on clustering algorithm using a combination of five metrics. Among these metrics lies the behavioral level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. Moreover, a summary of the highlight of the authors' work is provided in a comprehensive strategy for monitoring the network, so as to detect and remove the malicious nodes. Simulation study is used to demonstrate the performance of the proposed algorithm.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.