Next Article in Journal
Non-Destructive Monitoring of Crop Fresh Weight and Leaf Area with a Simple Formula and a Convolutional Neural Network
Next Article in Special Issue
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection
Previous Article in Journal
A Hybrid Intelligent Simulation System for Building IoT Networks: Performance Comparison of Different Router Replacement Methods for WMNs Considering Stadium Distribution of IoT Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain

by
Yves Frédéric Ebobissé Djéné
1,2,*,
Mohammed Sbai El Idrissi
3,
Pierre-Martin Tardif
4,
Ali Jorio
2,
Brahim El Bhiri
2 and
Youssef Fakhri
1
1
LRI, Faculty of Sciences, Ibn Tofail University, Kenitra 14000, Morocco
2
SMARTiLab/EMSI, 49 Patrice Lumumba, Hassan, Rabat 10000, Morocco
3
Department of Computer Science, Faculty of Sciences, Sherbrooke University, 2500 Bd de l’Université, Sherbrooke, QC J1K 2R1, Canada
4
GRIC, Management School, Sherbrooke University, 2500 Bd de l’Université, Sherbrooke, QC J1K 2R1, Canada
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(20), 7730; https://doi.org/10.3390/s22207730
Submission received: 23 August 2022 / Revised: 1 October 2022 / Accepted: 6 October 2022 / Published: 12 October 2022
(This article belongs to the Special Issue Recent Trends and Advances in Sensors Cybersecurity)

Abstract

:
Wireless Sensors Networks are integrating human daily life at a fast rate. Applications cover a wide range of fields, including home security, agriculture, climate change, fire prevention, and so on and so forth. If WSN were initially flat networks, hierarchical, or cluster-based networks have been introduced in order to achieve a better performance in terms of energy efficiency, topology management, delay minimization, load balancing, routing techniques, etc. As cluster-based algorithms proved to be efficient in terms of energy balancing, security has been of less importance in the field. Data shared by nodes in a WSN can be very sensitive depending on the field of application. Therefore, it is important to ensure security at various levels of WSN. This paper proposes a formal modeling of the energy consumed to secure communications in a cluster-based WSN in general. The concept is implemented using the Proof of Authentication (POAh) paradigm of blockchain and applied to a Multi-hop Clustering Algorithm based on spectral classification. The studied metrics are residual energy in the network, the number of alive nodes, first and last dead node.

Graphical Abstract

1. Introduction

WSN face many challenges: resource constraints in terms of energy and computational power, low transmission bandwidths and processing capabilities, and hidden terminals provoking collisions during data transmission [1,2]. Clustering techniques were proposed to tackle some of these issues. Compared with flat networks, cluster-based networks organize the network in smaller groups based on network characteristics and application requirements.
They logically divide WSN in units or clusters where different types of nodes are identified and assigned with roles:
  • Cluster Members (CM): these nodes are attached to the same cluster. They read data from the physical environment.
  • Cluster-Heads (CH): coordinate CMs, collect, aggregate, and forward data to a closer CH or to the sink.
  • Gateways (optional): in some cluster-based WSN (CBWSN), gateways serve as relay point to forward data to other clusters or to maintain contact with close range clusters.
  • Base Station (BS) or Sink: the final destination of data.
Ref. [2] defines clustering as a type of topology management techniques which can group nodes to improve the efficiency of the network by managing resources and rotating responsibilities among nodes to provide fairness. Key characteristics of CBWSN [1] include data fusion and load management, efficient energy management, relay node, collision avoidance, latency reduction, fault tolerance, deadlock prevention, quality of service (QOS), etc. In order to evaluate the performance of CBWSN, some elements to consider are:
  • Cluster formation: the network model is either distributed or centralized. Cluster heads are selected using the node’s id, neighbor numbers, average hop distance, remaining energy, communication cost, and distance to the BS or to other cluster members. Clusters can be formed by grouping nodes and choosing CHs in these groups or by selecting first CHs and requesting CMs to connect to CHs. CHs are elected based on the availability of resources, randomly or in a predetermined way. CH election can be centralized or distributed.
  • Cluster complexity: referred to the number of rounds required to perform the cluster formation and the transformation of data using broadcasting, multi-casting, or data aggregation
  • Cluster communications and data forwarding: as nodes transfer data to CHs, it can be forwarded to the BS raw or combined with other information. Intra- and inter-cluster transmissions are executed using single hop or multi-hop routing depending on the position of the receiver and the distance between the sender and the endpoint.
  • Cluster management: deals with network topology changes over time. Re-clustering may occur after a specific interval of time (time-based), or an event (event-based). For example, how is the topology affected when a a node enters, exits the network or runs out of energy?
According to [2], clustering algorithms have been developed to meet specific objectives, such as load balancing, scalability, packets delivery, throughput, delay, and 94.8% of surveyed articles in the CA field listed energy consumption as their objective. These clustering techniques were implemented using clear communications and did not integrate security features, such as cryptography. This study formally evaluates the costs generated by the addition of security elements in cluster-based WSN. The concept is implemented using PoAh, a lightweight Blockchain paradigm, applied to a Multi-hop Clustering Algorithm based on spectral classification. The paper is organized as follow: Section 2 examines clustering algorithms and security features. Section 3 covers Multi-hop Clustering Algorithm based on spectral classification and formal modeling of costs generated to secure communications, as well as the simulation environment. Section 4 presents results and interpretations with regards to residual energy, the number of alive nodes, first, half, and last dead nodes.

2. Related Work

Research in clustering algorithms for WSN has been prolific [3]. LEACH [4], EEHC [5], HEED [6], SEDEEC [7], ECFP [8], EAFCA [9], EERC [10], and EACLE [11] are examples of clustering algorithms used to enhance performances in WSN. These clustering techniques mainly focus on “open” clustering that is without security features.
Current applications require modern and powerful security techniques because they handle sensitive data depending on the field of application. Several propositions emerged to address security in cluster-based WSN.
An Energy Aware Trust-based Secured Routing Algorithm (EATSRA) [12] was proposed to evaluate the trust reputation of different nodes in the network. The end goal was to create a secure path to reach the BS using trust metrics such as trust scores and node behavior in order to identify safe paths.
Ref. [13] focused on CH election based on trust with the objective of detecting malicious cluster heads. Ref. [14] proposed a lightweight trust-based secure clustering in WSN using honeybee mating intelligence approach, while [15] used blockchain technology in WSN.
Previous works [16,17] introduced Proof-of-Authentication (PoAh) paradigm in blockchain which ensures integrity, confidentiality, and authentication with less requirements in terms of CPU usage. Ref. [18] adapted it to secure a flat and centralized network. Although these techniques address security with regards to various attacks, most of them do not evaluate the impact of security on energy consumption. The objective of this paper is to secure a clustering algorithm in WSN and evaluate the induced cost in terms of energy. This paper implements a secure Multi-hop Clustering Algorithm based on spectral classification (MHCA-SC) [19] using PoAh.

3. Methodology

The Multi-hop Clustering Algorithm based on spectral classification steps are summarized in the following subsections:

3.1. Pre-Processing Phase

Using the RSS (Received Signal Strength), each node calculates its distance to the BS in order to define the region it belongs to (Figure 1). The information is conveyed to the BS which builds a graph and determines a similarity matrix A based on the following equation:
A = [ a i j ] = e x p ( d 2 ( i , j ) 2 σ 2 ) , if i j 0 , otherwise
where d ( i , j ) is the euclidean distance between i and j and σ is the standard deviation or the mean distance of a point to its nearest neighbors.
The degree and Laplacian matrices are then generated.

3.2. Clustering Phase

Based on K-means classification and the Laplacian matrix, the main goal of this step is to determine the optimal number of clusters and assign each node to its corresponding cluster.

3.3. Cluster Head Election Phase

CHs are then determined and selected based on nodes’ id and their remaining energy in each cluster. For a node to be elected as a CH, its residual energy must be greater than the mean residual energy in the cluster, while the node’s id equals to Ck = (r mod|Sk|) where r is the round and Sk the number of nodes in the cluster. All nodes with a remaining power lower than Ermin notify node Ck + 1 of its energy.

3.4. Intra-Cluster Routing

In the same cluster, nodes communicate directly with their CH using schedule TDMA (Time Division Multiple Access).

3.5. Inter-Cluster Multi-Hop Routing

Although nodes easily reach their CH using single hop communications in the same cluster, packets are sent from CHs to the sink using a multi-hop routing technique (Figure 1).

3.6. Securing MHCA-SC

Compared with HCA-SC [20], SCNOC [21], DECSA [22], and LEACH-C [23], MHCA-SC proved to be more efficient, considering the FDN (first dead node) and the total residual energy in the network. However, with the growing number of attacks on WSN and their consequences, it is important to introduce security techniques in order to protect the network. In [18], a lightweight blockchain for secured WSN in single hop and centralized wireless networks was implemented. Prior to sending a message to the sink, each node hashes its MAC address and the message to send using SHA256 or MD5. Mac and message hashes are merged, then encrypted using AES256 and sent to the sink as detailed in Algorithm 1. The sink decrypts data (hashes) and authenticates the node by comparing the received values with a list of trusted nodes details, as described in Algorithm 2.
Algorithm 1 Node
  • Require: MACAddress
  • Ensure: Send Message to the sink
  • n o d e M A C a d d r e a d C o n t i k i M A C ( ) ;
  • t e x t D a t a H e l l o ;
  • h a s h M A C h a s h ( n o d e M A C a d d ) ;
  • while true do
  •    s t a r t T i m e r ( t i m e r ) ;
  •    h a s h T e x t h a s h ( t e x t D a t a ) ;
  •    d a t a S e n d m e r g e ( h a s h M A C , h a s h T e x t ) ;
  •   if  t i m e r is expired then
  •      s e n d ( d a t a S , s i n k I d ) ;
  •   end if
  • end while
Algorithm 2 Sink
  • Require: node (nodeId, MACAddress, hashMAC)
  • Require: TrustedNodes: Array of nodes
  • Ensure: Accept or reject a message
  • i n i t T r u s t e d N o d e s ( ) ;
  • while true do
  •   if  m e s s a g e R e c e i v e d == true then
  •      [ h a s h M A C , h a s h T e x t , n o d e I d ] e x t r a c t ( d a t a s ) ;
  •      r c h e c k ( n o d e I d , h a s h M A C ) ;
  •     if r==1 then
  •        p r i n t ( T r u s t e d n o d e : A c c e p t ) ;
  •     else if r ==2 then
  •        p r i n t ( M a l i c i o u s N o d e : R e j e c t ) ;
  •     else if r ==0 then
  •        p r i n t ( U n k n o w n n o d e : R e j e c t ) ;
  •     end if
  •   end if
  • end while
The main challenge of securing clustering algorithms in WSN and specifically MHCA-SC, is to identify where cryptography takes place in the communication model. Messages in clustering in general and MHCA-SC are exchanged from (Figure 1):
  • Node to CH (intra cluster): Each node within a cluster sends data to its CH (1 in Figure 1);
  • CH to CHs (inter cluster): CHs cannot directly reach the sink and forward their data to CHs that relay to other CHs (2 in Figure 1) or to CHs that can easily reach the BS (3 in Figure 1);
  • CH to BS/sink: these CHs directly access the sink with single hop communications (4 in Figure 1).
Several scenarios are described below to secure MHCA-SC.
  • Securing Node to CH communications: each node computes hashes, encrypts the data and sends it to the CH. Here, the added energy is the energy required to hash the message and the MAC address and finally cypher the combined data. Extra energy is calculated as follows:
    E N C H = n = 1 t E n c h = n = 1 t ( 2 · E h a s h + E e n c )
    where E n c h is the energy spent to secure communications between a node and its CH, E h a s h the energy spent to compute a hash, E e n c the energy used to encrypt, t is the number of nodes in the cluster.
  • Securing CH to CHs (inter cluster) communications: The choices available in this scenario are:
    (a)
    A CH deciphers messages received from every single node within its cluster in order to authenticate the sender. Upon a successful authentication, the CH aggregates hashes, encrypts and forwards data to the next hop (steps b or c depending on the position of the CH and the cluster). Added energy in this case is calculated as follows:
    E C H 1 = n = 1 t ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
    where E C H 1 is the energy spent to secure communications between a CH and another CH, E d e c the energy spent to decrypt each message, E a u t h the energy spent to authenticate a node.
  • CH aggregates data received from nodes within its cluster (already encrypted by nodes) and forwards it to the next hop (steps b or c). Here, the added energy is
    E C H 1 = 0
  • If a CH receives data from another CH, it either decrypts the data, authenticates the sender (another CH) and relays it (encryption) with the resulting equation:
    E C H 2 = ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
  • Or directly forwards it to the next CH.
    E C H 2 = 0
  • Securing CH to BS communications: CHs are directly in contact with the Base Station/sink.
    (a)
    CH deciphers messages received from other CHs. If the sender (CH) is authenticated, data are prepared and securely sent to the sink. The resulting energy is:
    E C H S = ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
    where E C H S is the energy spent to secure communications between a CH and the sink.
    (b)
    Otherwise, the CH conveys data to the sink without any processing.
    E C H S = 0
Table 1 highlights the required amount of energy to send messages from cluster1 to the base station based on Figure 1 in various configurations ( E 1 8 ). The overall consumption of energy in the network includes energy costs generated by clusters 2, 3, and 4.
Where:
E 1 = n = 1 t ( 2 · E h a s h + E e n c ) + n = 1 t ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 2 = n = 1 t ( 2 · E h a s h + E e n c ) + n = 1 t ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 3 = n = 1 t ( 2 · E h a s h + E e n c ) + n = 1 t ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 4 = n = 1 t ( 2 · E h a s h + E e n c ) + n = 1 t ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 5 = n = 1 t ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 6 = n = 1 t ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 7 = n = 1 t ( 2 · E h a s h + E e n c ) + ( E d e c + E a u t h ) + ( 2 · E h a s h + E e n c )
E 8 = n = 1 t ( 2 · E h a s h + E e n c )
It is clearly noticeable that hashing and encrypting messages at every stage of the transmission increases the energy consumption in the network. In order to ensure minimal energy consumption, path E 8 is the best choice. In this case, hashes are computed and then encrypted by the node, while cluster heads only forward the encrypted data to the base station. The sink deciphers and authenticates each received message. Figure 2 illustrates a packet sent by a node to its CH and forwarded to the base station combined with packets from the same cluster. Encryption provides confidentiality while hashing ensures integrity: any data alteration by a malicious node during transportation is detected by the sink because the sink maintains a list of trusted nodes. Any node spoofing a trusted node MAC is considered as malicious by the sink because the node’s ID, MAC address, and the corresponding hashes will not match. It is also important to note that the sink is considered as a device with unlimited power and CPU resources compared with other nodes. As a result, it manages the majority of the computation load in the network.

3.7. Simulation and Environment

Simulations were carried out in two phases on a DELL Latitude 55220 with 16GO RAM. The first one consisted in the evaluation of the energy consumed to implement the MAC address hashing using SHA256, as well as the encryption of messages using AES256. This part was implemented in a Tmote Sky in Contiki 3.0, an emulator for WSN and IoT where network devices are written in C. Hashing and encryption were implemented on a single node in order to calculate the energy spent for these operations. Energest is a module in Contiki that measures the number of clock ticks in different states, such as transmission, reception, CPU, sleep mode, and low power mode. During our simulations, the CPU clock ticks was the only needed value. Algorithm 1 was repeated 100 times and the average value was calculated (1078 ticks). Using the Tmote datasheet specifications, the consumed energy was obtained. The next phase consisted in simulating the SMHCA-SC. MHCA-SC was originally implemented in MATLAB. During simulations, 300, 400, and 500 nodes were randomly scattered on a 300 m × 300 m area and the sink was positioned at x = 150 m, y = 350 m during our simulations. Three 100 m wide areas were created containing nodes. Figure 3 and Figure 4 represent simulations with 300 and 500 nodes.
The message was 4000 octets in size and the energy for driving the electronics ( E e l e c ) was 50 nJ/bit. The coefficients E f s and E m p were respectively 10 pJ/bit/m 2 and 0.0013 pJ/bit/m 4 . These parameters, as shown in Table 2 are used to calculate the amplifier energy E a m p . The energy consumed by hashing and encryption was introduced in the model when nodes in a same cluster send messages to their cluster head. In total, 10 randomly networks were generated for each model and the mean values were calculated.
Figure 5 illustrate the resulting clusters in the network and types of communication that occur during simulations. Nodes to cluster heads communications are not shown, but CH to CH, CH to BS transmissions are observed as single hop or multi-hop messages.

4. Results and Discussions

4.1. Mean Residual Energy

Integrating security features increased the energy spent by nodes and therefore affected the overall lifespan of the network. Figure 6a–c show that mean residual energy of SMHCA-SC remained below MHCA-SC in all scenarios (numbers of nodes). In terms of energy (Figure 6d), a 3% decrease in residual energy was observed at round 100 between the two models. The decline grew gradually to 5, 8, 16, and 37% at rounds 200, 300, 400, and 500, respectively (300/400 nodes). This means that the MHCA-SC lifespan is greater than its secure version and that security features introduce a cost in terms of residual energy. The same patter was recorded for the 500 nodes model.
The graph representing the number of alive nodes over time is related to the residual energy in the network. In Figure 7a, with 300 nodes at the beginning of the simulation, the curves for MHCA-SC and SMHCA-SC remained relatively close up to rounds 199 and 171, respectively, where 294 nodes were still alive. From 294 alive nodes to 150 alive nodes, the curves decline by 23% for MHCA-SC and 30% for SMHCA-SC, respectively. From 150 alive nodes, MHCA-SC curve declines 30% less than SMHCA-SC as they reached 18 alive nodes at rounds 989 and 761, respectively, and, finally, decreased by 19% and 34% before all nodes die. In Figure 7b,c, MHCA-SC decline less than SMHCA-CS, thus showing the impact of the security features on the number of alive nodes over time.

4.2. First Dead Node

Table 3 and Figure 8a–c exhibit the values obtained for the first dead node. For 300 nodes, FDN occurred at round 165 and 150 for MHCA-CS and SMHCA-CS, and at rounds 204 and 187 for 400 nodes. For 500 nodes, FDN occurred at round 216 for both protocols. Simulations with a higher number of nodes may highlight possible correlation between the number of nodes in the network and FDN occurrences.
As 10 topologies were generated, a closer look at individual simulations highlighted several cases where FDN occurred faster in MHCA-CS compared with SMHCA-CS. This was observed in simulations 4, 5, 7, and 8 of Figure 9a for the 300-node model. It also occurred in simulations 2, 6, and 8 for 400 nodes (Figure 9b), and in simulations 8 and 9 for 500 nodes (Figure 9c). These deviations could be explained by the fact that as nodes are randomly scattered in the network, for the same model simulation 5 may produce a different model for MHCA-SC and SMHCA-SC. This also suggests that other factors, such as distance and numbers of nodes in the cluster may have more impact on nodes energy and should, therefore, be thoroughly investigated.

4.3. Half Dead Node

As shown in Table 4, 50% of nodes died faster in SMHCA-SC compared with MHCA-SC. For 300 nodes, it was spotted at rounds 639 and 801, respectively, while the same event was observed at rounds 687 and 873 for the 400-nodes model and 707 and 910 for the 500-nodes model.

4.4. Last Dead Node

The network lifespan is also affected by cryptographic techniques. As illustrated in Table 5 for the 300-node model, all nodes were dead at rounds 1080 and 813, respectively, for MHCA-SC and SMHCA-SC. With an initial number of 400 nodes, the batteries of all sensors drained at rounds 1099 and 810 while the values were 1110 and 815 for the 500-node model. These values are shown in Figure 10.

4.5. LECSA vs. SMHCA-CS

LESCA [24], a Location-Energy Spectral Clustering Algorithm, was more effective than LEACH-C and DECSA in terms of residual energy. Compared with LESCA, SMHCA-CS lasted longer in terms of mean residual energy for 500 nodes (Figure 11). FDN also occurred faster with LESCA, as shown in Figure 12. The number of alive nodes decreased at a linear rate when 90% nodes were still alive, but remained lower than SMHCA-CS up to 20% alive nodes. From 20% alive nodes, LESCA was more effective in terms of lifespan (Figure 13).
From the above results, as energy consumption was evaluated using different metrics, SMHCA-CS drained more energy in nodes compared with MHCA-CS. The number of alive nodes in SMHCA-CS declined faster compared with MHCA-CS. Half of the alive nodes and the last dead node occurred also faster in all cases. Compared with some open (not secured) cluster-based WSN, such as LESCA and SMHCA-CS, was less energy consuming. The main advantage of this work is to identify communications within cluster-based WSN and formally assess energy consumption induced to secure them. Lightweight blockchain paradigm (PoAh) ensures confidentiality, integrity, and authentication. This study’s main disadvantage is the use of two separate environments: Contiki measures energy and MATLAB evaluates the impact of security on the network related to energy. This method is not suitable to test the secured version against well known attacks such as sinkhole, wormhole, sybil attacks, and Denial Of Service because security was not implemented within MATLAB. This issue can be addressed by fully implementing a cluster-based WSN in Contiki or even NS2 for example and performing the previously mentioned attacks. It will also give an opportunity to study other metrics, such as throughput and latency, that are important in WSN.

5. Conclusions

Clustering usage improved WSN lifespan, load balancing, scalability, and packet delivery by rotating cluster head’s responsibilities over different nodes in clusters. CBWSN are evaluated in cluster formation, complexity, communication, and management. Security issues in WSN have been raised, especially in sensitive areas, such as military, medical, water delivery, and even smart grids, as more and more attacks surface, aiming to compromise these networks. Although some research projects propose several solutions to increase WSN safety using cryptography and ensure trustworthiness of nodes, authentication, integrity, and confidentiality, the cost in terms of energy consumption and lifespan is not formally assessed. The study formally assesses energy costs induced to secure CBWSN. The concept is applied to Multi-hop Clustering Algorithm using blockchain’s paradigm namely Power of Authentication at different levels of the communication model.
Compared with MHCA-CS, SMHCA-CS consumed more energy in general. This was precisely measured with FDN, LDN, residual energy, and the number of alive nodes. For example, with an initial number of 300 nodes, FDN was recorded at rounds 165 and 150, respectively, for MHCA-SC and SMHCA-SC. Although, for 400 nodes, FDN was spotted at rounds 204 and 187, it was noted at round 216 for MHCA-SC and SMHCA-SC. The half dead node happened at rounds 801 and 639 while LDN at rounds 1080 and 813 for 300 nodes. Compared with LESCA, SMHCA-CS exhibited better performances in terms of residual energy, FDN and the number of alive nodes at some point. For instance, the number of alive nodes decreased at a linear rate when 90% of nodes were alive but remained below SMHCA-CS.This illustrates the need for lightweight security algorithms. Although this study focuses on Multi-hop Clustering Algorithm based on spectral classification, it was implemented on two different environments, thus preventing simulations of well-known attacks that may occur in a WSN. Future works include a full implementation of a cluster-based WSN and its secured version, its robustness against several know attacks, as well as the evaluation of other metrics.

Author Contributions

Formal analysis, Y.F.E.D. and B.E.B.; Funding acquisition, B.E.B.; Methodology, Y.F.E.D. and B.E.B.; Software, Y.F.E.D. and A.J.; Supervision, Y.F. and P.-M.T.; Validation, Y.F.E.D., B.E.B., P.-M.T. and Y.F.; Writing—original draft, Y.F.E.D.; Writing—review and editing, Y.F.E.D., M.S.E.I., P.-M.T., B.E.B. and Y.F. All authors have read and agreed to the published version of the manuscript.

Funding

The APC was sponsored by SMARTiLab/EMSI.

Acknowledgments

The authors would like to thank SMARTiLab/EMSI and Public Safety Canada for support and infrastructure.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Sample Availability

Data are available on request to authors.

Abbreviations

The following abbreviations are used in this manuscript:
AESAdvanced Encryption Standard
BSBase Station
CPUCentral Processing Unit
CBWSNCluster-based Wireless Sensor Network
CHCluster Head
CMCluster Member
DECSADistance-Energy Cluster Structure Algorithm
DOSDenial Of Service
EACLEEnergy-Aware Clustering Scheme with Transmission Power Control for Sensor Networks
EATSRAEnergy Aware Trust-based Secured Routing Algorithm
EAFCAEnergy Aware Fuzzy Clustering Algorithm
ECPFEnergy-aware Distributed Dynamic Clustering Protocol using Fuzzy Logic
EEHCEnergy Efficient Heterogeneous Clustered scheme
EERCEnergy Efficient Recursive Clustering
FDNFirst Dead Node
HCA-SCHierarchical Clustering Algorithm Based on Spectral Classification
HEEDHybrid Energy Efficient Distributed clustering
LBSWSNLightweight Blockchain for Secure Wireless Sensor Network
LDNLast Dead Node
LEACHLow Energy Adaptive Clustering Hierarchy
LEACH-CLow Energy Adaptive Clustering Hierarchy Centralized
LESCALocation-Energy Spectral Clustering Algorithm
MACMedia Access Control
MHCA-SCMulti-hop Clustering Algorithm based on Spectral Classification
POAhProof-Of-Authentication
QOSQuality Of Service
RAMRandom Access Memory
RSSReceived Signal Strength
SEDEECStochastic and Equitable Distributed Energy-Efficient Clustering
SCNOCSpectral Classification based on Near Optimal Clustering
SHASecure Hash Algorithm
SMHCA-SCSecured Multi-hop Clustering Algorithm based on Spectral Classification
TDMATime Division Multiple Access
WSNWireless Sensor Network

References

  1. Zeb, A.; Islam, A.K.M.M.; Zareei, M.; Mamoon, I.A.; Mansoor, N.; Baharun, S.; Katayama, Y.; Komaki, S. Clustering Analysis in Wireless Sensor Networks: The Ambit of Performance Metrics and Schemes Taxonomy. Int. J. Distrib. Sens. Netw. 2016, 12, 4979142. [Google Scholar] [CrossRef] [Green Version]
  2. Shahraki, A.; Taherkordi, A.; Haugen, Ø.; Eliassen, F. Clustering Objectives in Wireless Sensor Networks: A Survey and Research Direction Analysis. Comput. Netw. 2020, 180, 107376. [Google Scholar] [CrossRef]
  3. Akila, I.S.; Manisekaran, S.V.; Venkatesan, R. Modern Clustering Techniques in Wireless Sensor Networks. In Wireless Sensor Networks; Sallis, P., Ed.; IntechOpen: Rijeka, Hrvatska, 2017; Volume 6, pp. 121–130. [Google Scholar]
  4. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000. [Google Scholar] [CrossRef]
  5. Bandyopadhyay, S.; Coyle, E.J. An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. In Proceedings of the IEEE INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; Volume 3, pp. 1713–1723. [Google Scholar]
  6. Younis, O.; Fahmy, S. HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-Hoc Sensor Networks. IEEE Trans. Mob. Comput. 2004, 3, 366–379. [Google Scholar] [CrossRef] [Green Version]
  7. Elbhiri, B.; Saadane, R.; Aboutajdine, D. Stochastic and Equitable Distributed Energy-Efficient Clustering (SEDEEC) for Heterogeneous Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 2011, 7, 4–11. [Google Scholar] [CrossRef]
  8. Taheri, H.; Neamatollahi, P.; Younis, O.M.; Naghibzadeh, S.; Yaghmaee, M.H. An Energy-Aware Distributed Clustering Protocol in Wireless Sensor Networks Using Fuzzy Logic. Ad Hoc Netw. 2012, 10, 1469–1481. [Google Scholar] [CrossRef]
  9. Akila, I.S.; Venkatesan, R. A Cognitive Multi-hop Clustering Approach for Wireless Sensor Networks. Wirel. Pers. Commun. 2016, 90, 729–747. [Google Scholar] [CrossRef]
  10. Akila, I.; Subaselvi, S. Energy efficient recursive clustering approach for wireless sensornetworks. Int. J. Electron. Electr. Comput. Syst. 2017, 6, 121–130. [Google Scholar]
  11. Yanagihara, K.; Taketsugu, J.; Fukui, K.; Fukunaga, S.; Hara, S.; Kitayama, K. EACLE: Energy-Aware Clustering Scheme with Transmission Power Control for Sensor Networks. Wirel. Pers. Commun. 2007, 40, 401–415. [Google Scholar] [CrossRef]
  12. Selvi, M.; Thangaramya, K.; Ganapathy, S.; Kulothungan, K.; Khannah Nehemiah, H.; Kannan, A. An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks. Wirel. Pers. Commun. 2019, 105, 1475–1490. [Google Scholar] [CrossRef]
  13. Saidi, A.; Benahmed, K.; Seddiki, N. Secure Cluster Head Election Algorithm and Misbehavior Detection Approach Based on Trust Management Technique for Clustered Wireless Sensor Networks. Ad Hoc Netw. 2020, 106, 102215. [Google Scholar] [CrossRef]
  14. Sahoo, R.R.; Singh, M.; Sahoo, B.M.; Majumder, K.; Ray, S.; Sarkar, S.K. A Light Weight Trust Based Secure and Energy Efficient Clustering in Wireless Sensor Network: Honey Bee Mating Intelligence Approach. Procedia Technol. 2013, 10, 515–523. [Google Scholar] [CrossRef] [Green Version]
  15. Hsiao, S.; Sung, W.T. Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission. Comput. Mater. Contin. 2021, 68, 1899–1918. [Google Scholar] [CrossRef]
  16. Puthal, D.; Mohanty, S.P.; Nanda, P.; Kougianos, E.; Das, G. Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019; pp. 1–5. [Google Scholar]
  17. Puthal, D.; Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E. PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-Scale IoT Frameworks. arXiv 2020, arXiv:2001.07297. [Google Scholar]
  18. Ebobissé Djéné, Y.F.; EL Idrissi, M.S.; Tardif, P.-M.; El Bhiri, B.; Fakhri, Y.; Karfa Bekali, Y. Lightweight-Blockchain for Secured Wireless Sensor Networks: Energy Consumption of MAC Address-Based Proof-of-Authentication. In Advanced Technologies for Humanity; Springer International Publishing: Cham, Switzerland, 2022; pp. 182–192. [Google Scholar]
  19. Jorio, A.; Fkihi, S.E.; Elbhiri, B.; Aboutajdine, D. Multi-hop Clustering Algorithm Based on Spectral Classification for Wireless Sensor Network. In Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015, Saidia, Morocco, 7–9 May 2015; El Oualkadi, A., Choubani, F., El Moussati, A., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 255–264. [Google Scholar]
  20. Jorio, A.; El Fkihi, S.; Elbhiri, B.; Aboutajdine, D. A Hierarchical Clustering Algorithm Based on Spectral Classification for Wireless Sensor Networks. In Proceedings of the 2014 International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco, 14–16 April 2014; pp. 861–866. [Google Scholar]
  21. Elbhiri, B.; El Fkihi, S.; Saadane, R.; Aboutajdine, D. Clustering in Wireless Sensor Networks Based on near Optimal Bi-Partitions. In Proceedings of the 6th EURO-NGI Conference on Next Generation Internet, Paris, France, 2–4 June 2010; pp. 1–6. [Google Scholar]
  22. Yong, Z.; Pei, Q. A Energy-Efficient Clustering Routing Algorithm Based on Distance and Residual Energy for Wireless Sensor Networks. Procedia Eng. 2012, 29, 1882–1888. [Google Scholar] [CrossRef] [Green Version]
  23. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Micro-Sensor Networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  24. Jorio, A.; El Fkihi, S.; Elbhiri, B.; Aboutajdine, D. An Energy-Efficient Clustering Routing Algorithm Based on Geographic Position and Residual Energy for Wireless Sensor Network. J. Comput. Netw. Commun. 2015, 2015, 170138. [Google Scholar] [CrossRef]
Figure 1. Communication model in MHCA-SC.
Figure 1. Communication model in MHCA-SC.
Sensors 22 07730 g001
Figure 2. Sample Packet.
Figure 2. Sample Packet.
Sensors 22 07730 g002
Figure 3. 300-Node model sample.
Figure 3. 300-Node model sample.
Sensors 22 07730 g003
Figure 4. 500-Node model sample.
Figure 4. 500-Node model sample.
Sensors 22 07730 g004
Figure 5. 500-Node Cluster sample.
Figure 5. 500-Node Cluster sample.
Sensors 22 07730 g005
Figure 6. Mean residual energy. (a) 300-node model. (b) 400-node model. (c) 500-node model. (d) Residual energy percentage.
Figure 6. Mean residual energy. (a) 300-node model. (b) 400-node model. (c) 500-node model. (d) Residual energy percentage.
Sensors 22 07730 g006
Figure 7. Alive nodes. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Figure 7. Alive nodes. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Sensors 22 07730 g007
Figure 8. First dead node. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Figure 8. First dead node. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Sensors 22 07730 g008
Figure 9. FDN evolution. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Figure 9. FDN evolution. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Sensors 22 07730 g009
Figure 10. Last dead node. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Figure 10. Last dead node. (a) 300-node model. (b) 400-node model. (c) 500-node model.
Sensors 22 07730 g010
Figure 11. Residual energy: LESCA vs. SMHCA-CS vs. MHCA-CS (500 Nodes).
Figure 11. Residual energy: LESCA vs. SMHCA-CS vs. MHCA-CS (500 Nodes).
Sensors 22 07730 g011
Figure 12. FDN: LESCA vs. SMHCA-CS vs. MHCA-CS (500 Nodes).
Figure 12. FDN: LESCA vs. SMHCA-CS vs. MHCA-CS (500 Nodes).
Sensors 22 07730 g012
Figure 13. Alive nodes: LESCA vs. SMHCA-CS vs. MHCA-CS (500 nodes).
Figure 13. Alive nodes: LESCA vs. SMHCA-CS vs. MHCA-CS (500 nodes).
Sensors 22 07730 g013
Table 1. Extra consumed energy evaluation to secure MHA-CS.
Table 1. Extra consumed energy evaluation to secure MHA-CS.
Node to CHCH to CHCH to CHCH to BSFinalConsumed Energy
C1C1 to C2C2 to C3C3 to BS
(1)(2)(4)(6)(1) (2) (4) (6) E 1 = ( 1 ) + ( 2 ) + ( 4 ) + ( 6 )
(7)(1) (2) (4) (7) E 2 = ( 1 ) + ( 2 ) + ( 4 )
(5)(6)(1) (2) (5) (6) E 3 = ( 1 ) + ( 2 ) + ( 6 )
(7)(1) (2) (5) (7) E 4 = ( 1 ) + ( 2 )
(3)(4)(6)(1) (3) (4) (6) E 5 = ( 1 ) + ( 4 ) + ( 6 )
(7)(1) (3) (4) (7) E 6 = ( 1 ) + ( 4 )
(5)(6)(1) (3) (5) (6) E 7 = ( 1 ) + ( 6 )
(7)(1) (3) (5) (7) E 8 = ( 1 )
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
E e l e c 50 nJ/bit
E f s 10 pJ/bit/m 2
E m p 0.0013 pJ/bit/m 4
E D A 5 nJ/bit/message
d 0 88 m
Message Size4000 bytes
Area300 m × 300 m
Zone 1( x [ 0 , 300 ] , y [ 0 , 100 ] )
Zone 2( x [ 0 , 300 ] , y [ 100 , 200 ] )
Zone 3( x [ 0 , 300 ] , y [ 200 , 300 ] )
Sink Position(150 m, 350 m)
Number of Nodes300, 400, 500
Table 3. First dead node.
Table 3. First dead node.
300 N400 N500 N
MHCA-SC165204216
SECURED MHCA-SC150187216
Table 4. Half dead node.
Table 4. Half dead node.
300 N400 N500 N
MHCA-SC801873910
SECURED MHCA-SC639687707
Table 5. Last dead node.
Table 5. Last dead node.
300 N400 N500 N
MHCA-SC108010991110
SECURED MHCA-SC813810815
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ebobissé Djéné, Y.F.; El Idrissi, M.S.; Tardif, P.-M.; Jorio, A.; El Bhiri, B.; Fakhri, Y. A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain. Sensors 2022, 22, 7730. https://doi.org/10.3390/s22207730

AMA Style

Ebobissé Djéné YF, El Idrissi MS, Tardif P-M, Jorio A, El Bhiri B, Fakhri Y. A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain. Sensors. 2022; 22(20):7730. https://doi.org/10.3390/s22207730

Chicago/Turabian Style

Ebobissé Djéné, Yves Frédéric, Mohammed Sbai El Idrissi, Pierre-Martin Tardif, Ali Jorio, Brahim El Bhiri, and Youssef Fakhri. 2022. "A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain" Sensors 22, no. 20: 7730. https://doi.org/10.3390/s22207730

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop