An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Title | An enhanced three-layer clustering approach and security framework for battlefeld surveillance |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Macharla, D. R., Tejaskanda, S. |
Conference Name | 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS) |
Keywords | battlefeld surveillance, Clustering algorithms, composability, EHCA, energy consumption, Energy efficiency, hierarchical based formation, hierarchical clustering based approach, hierarchical works, layered architectures, malicious node, Metrics, Microelectronic Security, military computing, network lifetime, pattern clustering, protocol architecture, pubcrawl, residual energy routes, resilience, Resiliency, Routing, Routing protocols, security, security framework, security mechanism, telecommunication security, three-layer clustering approach, three-layer hierarchical clustering approach, time division multiple access, Wireless sensor networks, wireless sensor networks (WSNs) |
Abstract | Hierarchical based formation is one of the approaches widely used to minimize the energy consumption in which node with higher residual energy routes the data gathered. Several hierarchical works were proposed in the literature with two and three layered architectures. In the work presented in this paper, we propose an enhanced architecture for three layered hierarchical clustering based approach, which is referred to as enhanced three-layer hierarchical clustering approach (EHCA). The EHCA is based on an enhanced feature of the grid node in terms of its mobility. Further, in our proposed EHCA, we introduce distributed clustering technique for lower level head selection and incorporate security mechanism to detect the presence of any malicious node. We show by simulation results that our proposed EHCA reduces the energy consumption significantly and thus improves the lifetime of the network. Also, we highlight the appropriateness of the proposed EHCA for battlefield surveillance applications. |
URL | http://ieeexplore.ieee.org/document/8211719/ |
DOI | 10.1109/ICMDCS.2017.8211719 |
Citation Key | macharla_enhanced_2017 |
- protocol architecture
- wireless sensor networks (WSNs)
- wireless sensor networks
- time division multiple access
- three-layer hierarchical clustering approach
- three-layer clustering approach
- telecommunication security
- security mechanism
- security framework
- security
- Routing protocols
- Routing
- Resiliency
- resilience
- residual energy routes
- pubcrawl
- battlefeld surveillance
- pattern clustering
- network lifetime
- military computing
- Microelectronic Security
- Metrics
- malicious node
- layered architectures
- hierarchical works
- hierarchical clustering based approach
- hierarchical based formation
- Energy Efficiency
- energy consumption
- EHCA
- composability
- Clustering algorithms