MSCR Multidimensional Secure Clustered Routing Scheme in Hierarchical Wireless Sensor Networks
MSCR Multidimensional Secure Clustered Routing Scheme in Hierarchical Wireless Sensor Networks
*Correspondence:
[email protected]. Abstract
ac.cn For hierarchical wireless sensor network (WSN), the clustered routing protocol can
1
Science and Technology
on Micro‑system effectively deal with large-scale application requirements, thereby, how to efficiently
Laboratory, Shanghai elect the secure cluster heads becomes very critical. Unfortunately, many current stud-
Institute of Micro‑system ies only focus on improving security while neglecting energy efficiency and transmis-
and Information
Technology, Chinese sion performance. In this paper, a lightweight trust management scheme (LTMS) is
Academy of Sciences, proposed based on binomial distribution for defending against the internal attacks.
Shanghai 201800, China Simultaneously, distance domain, energy domain, security domain and environ-
Full list of author information
is available at the end of the ment domain are considered and introduced to propose a multidimensional secure
article clustered routing (MSCR) scheme by using dynamic dimension weight in hierarchi-
cal WSNs. The simulation results show that LTMS can effectively prevent a malicious
node from being elected as a cluster head, and MSCR can achieve a balance between
security, transmission performance and energy efficiency under the requirements of
environmental applications.
Keywords: Internet of Things, Wireless sensor network, Security, Routing protocol,
Trust management scheme
1 Introduction
The Internet of Things (IoT) is a technology that achieves the connection between things
via the Internet. With the rapid development of wireless communication, the wireless
sensors are becoming the important components of information collection in IoTs. By
using sensors, the devices’ operation status or environmental information connected to
them can be obtained. Moreover, these wireless sensor nodes are organized into a wire-
less sensor network (WSN) [1–3]. The sensed information is aggregated and transmitted
to the Internet via WSN, and finally, the connections between things are achieved. Cur-
rently, WSN can be applied in many fields [4–6], which involve environmental monitor-
ing, smart home, intelligent agriculture and industrial safety monitoring. Therefore, as
the important infrastructure, the WSN’s network performance directly determines the
operation quality of IoT.
In a hierarchical WSN [7–11], a sink node, that is, a cluster head (CH), is usually used
to aggregate the sensed information from cluster members, and the clustered routing
© The Author(s) 2021. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits
use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original
author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third
party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the mate-
rial. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or
exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://
creativecommons.org/licenses/by/4.0/.
Fang et al. J Wireless Com Network (2021) 2021:14 Page 2 of 20
protocols are deployed to reduce network traffic and energy consumption. A typical
clustered routing protocol, called low energy adaptive clustering hierarchy (LEACH)
protocol [12], was proposed to balance the network load and reduce the energy con-
sumption. However, in a hierarchical WSN, if a CH has the higher level, and its data
processing load become heavier, the failure of the higher-level CHs may cause the entire
network to be paralyzed. Thereby, the balancing load of a hierarchical WSN is a key issue
that determines overall network performance. At the same time, if a CH, especially a
high-level CH, is captured and compromised, it will impact on the information security
of the entire network.
The challenges of information security come mainly from the security attacks [13–
16]. In general, these security attacks are categorized into external attacks and internal
attacks for WSN. The former involves the probabilistic jamming attacks, the eavesdrop-
ping attacks, as well as the decoding attacks. The latter is launched by the compro-
mised node, and its attack behaviors include tampering, discarding, replaying, forging
and selective forwarding data packets. The external attacks can be defended against
by deploying encryption, authentication, digital watermarking and other traditional
security schemes. However, these security technologies cannot defend against internal
attacks. This is due to that the compromised nodes have hold the security algorithm
and keys. Furthermore, for the resource-constrained sensor nodes, the security algo-
rithms with high computational complexity are almost impossible to execute. Currently,
the information security in hierarchical WSNs is mainly improved to ensure the trans-
mission of sensed information in secure by lightweight encryption or authentication
schemes. However, due to unattended deployment of sensor nodes, there are no effective
schemes to prevent the capture and compromise of nodes. Thereby, the internal attacks
that are launched by those compromised nodes are inevitable. Simultaneously, once a
malicious node is elected as a CH, the authenticity and integrity of sensed information in
the entire cluster will not be guaranteed. Fortunately, some studies have shown that the
trust management scheme is an effective approach to defend against the internal attacks
[17, 18]. Moreover, we will adopt the trust value from the trust management scheme as a
key factor to elect a secure CH, and design a secure routing protocol.
In this context, to meet the requirements of network load balancing and security for
the clustered routing protocols, our contributions of this paper include the following:
To compare our contributions with the previous works, the MATLAB is used to sim-
ulate and. As a well-known mathematical software, MATLAB is used in data analysis,
Fang et al. J Wireless Com Network (2021) 2021:14 Page 3 of 20
wireless communication, deep learning, image processing and computer vision, signal
processing, quantitative finance and risk management, robotics, control systems and
other fields. The rest of this paper is organized as follows: firstly, the related works on
trust management scheme and clustered routing protocols are reviewed and analyzed
in Sect. 2. Then, LTMS and MSCR are proposed in Sect. 3. Furthermore, the numerical
simulation and analysis are discussed in Sect. 4. Finally, the conclusions are drawn in
Sect. 5.
2 Related works
In this section, we will review the recently research on trust management and discuss
the secure routing protocols in hierarchical WSNs.
the network by using a machine learning technique. The simulation results showed
smooth functioning of the network with less energy consumption. The proposed scheme
performed better than anonymous authentication for wireless body area networks with
provable security (AAWBAN) in terms of computational overhead, energy consump-
tion, data drop rate and throughput [21]. As one of key research points, the robust algo-
rithm did not provide more explanation on energy consumption, which was generated
by configuring the nodes and training the network.
Labraoui et al. presented TMR, a risk-based trust management scheme in WSNs.
Compared with the previous schemes, TMR evaluated the overall trust value of a node
by the reputation value and the risk value, which was based on interaction-derived infor-
mation. The risk evaluation was a very helpful component to build the trust model, in
order to effectively deal with the conflicting behaviors of the nodes. Through relevant
simulation, they got a compelling argument showing the ability of TMR to detect the
on–off attack [22]. However, although the maximal value of interactions risk factor
between nodes was defined, there were no further explanations on this metric while it
acted an important role in direct trust evaluation.
Under the background of equal scale one-hop clustered WSN, according to the behav-
iors of the sensor nodes within the cluster on event perception, packet forwarding or
data fusion, Fang et al. proposed a reputation management scheme based on multi-fac-
tor, describing the initialization, update, storage of the reputation value and the punish-
ment and redemption of malicious nodes in detail. The sensor node’s reputation value,
based on multi-factor, was used to characterize the trustworthiness of sensor node in
this scheme. Due to the classification to trust factors constituting nodes’ reputation val-
ues, and the improvement of calculation methods to reputation values, the objectivity
and impartiality were enhanced during the assessment of nodes’ reputation values. To
verify the effectiveness of the proposed reputation management scheme in identifica-
tion of distrusted nodes, they applied the reputation management scheme to the existing
SPIN routing protocol to obtain a new trust enhanced routing protocol, called SFA [23].
The punishment and redemption for malicious nodes were the common trust decision
schemes. It directly determined how the compromise node was processed. In SFA, how
to punish and redeem those malicious nodes lacked further descriptions.
The information security is always a trending topic in WSNs. Even if the classic trust
management based on BETA distribution and its improved model proposed recently
might detect the internal attacks, it still lacks an effective defense mechanism to prevent
the on–off attack of malicious nodes. Hence, according to the Gaussian distribution,
Zhou et al. introduced the trust management system and the novel method included the
controlling factor to defend against the on–off attacks in WSNs. In Gaussian trust man-
agement scheme (GTS), the cost of on–off attacks was mitigated by using the controlling
factor, and the malicious nodes were detected. Through some preliminary simulation
results, this model was more stable to describe reputation against other distributions
and easier to display the trust directly and sensitively, and it also had the powerful ability
to prevent from on–off attacks [24]. The parameter—penalty, had no clear quantification
based on different scenarios.
Kowshalya and Valarmathi proposed a trust management scheme to facilitate trust-
worthy automatic decision making based on behaviors of objects. They used social
Fang et al. J Wireless Com Network (2021) 2021:14 Page 5 of 20
Internet of Things (SIoT) trust metrics, namely direct trust, centrality, community inter-
est, cooperativeness, service score, expected trust, overall trust and trust updates, to
compute trustworthiness among objects. The expected trust and periodic trust were
updated evidently to detect the selective forwarding attacks. They demonstrated the
advantages of the proposed scheme with other existing trust management schemes and
pointed out the other trust management schemes under study took a longer duration to
detect on–off attacks due to lack of expected trust [25]. There were larger computational
cost and communication overhead in proposed scheme.
Wu et al. proposed a beta and link quality indicator (LQI)-based trust model (BLTM)
for WSNs. When a direct trust is calculated, they considered communication trust,
energy trust and data trust. Then, the weights of these factors were discussed. At last,
they also proposed an LQI analysis mechanism is to maintain the accuracy and stability
of the trust value for normal nodes with poor-quality links. Compared with the beta-
based trust and reputation evaluation system (BTRES) [18], the simulation results had
shown that BLTM can defend against denial of service (DoS) attack and data tampering
attack, and the trust value of normal nodes can maintain stable and accurate [26]. Obvi-
ously, the link quality indicator was an important parameter in PHY. Not every low-cost
microcontroller unit (MCU) of sensor node could obtain this indicator.
Han et al. proposed a synergetic trust model based on support vector machine (SVM),
called STMS, to achieve accurate and robust trust evaluation for an underwater acoustic
sensor networks (UASNs). The STMS is made up of three parts. (1) Three kinds of trust
evidences are generated and refined by cluster members. (2) By using SVM technology,
a trust prediction model was trained to evaluate accurate trust value. (3) The scheme of
double cluster heads was designed to enhance network security and prolong the net-
work lifetime. Simulation results demonstrated that, in the aspect of detect accuracy of
malicious nodes, success rate of communication and network lifetime, STMS performed
better than other related works in the sparse deployment environment [27]. Consider-
ing the constrained resources of underwater acoustic sensor, the complexity of proposed
model needed to be evaluated.
In healthcare-oriented wireless sensor network (HWSN), it is also facing enormous
security challenges, especially from internal attacks. It is difficult to distinguish many
attack behaviors from interference in the complex healthcare scenarios, such as on–off
attack. Fang et al. proposed a binomial distribution-based trust management scheme
(BDTMS) for HWSN. The proposed method could rapidly detect and effectively defend
against on–off attacks and bad mouthing attacks. The trust value of the node was evalu-
ated. Simulation results showed that, compared with the time-window-based resilient
trust management scheme (TRTMS) [17], the proposed BDTMS achieved better per-
formance in defending against on–off attack under obstacle movement, especially with
higher detection accuracy [28]. In BDTMS, the speed of obstacles did not be considered.
As mentioned above, the deferent trust management schemes/models are designed to
meet different security requirements in WSNs. However, the energy consumption often
seems to be ignored, while this is very important for resources-constrained nodes. Cur-
rently, most existing trust management schemes are based on trust/reputation evalua-
tion. The application of trust management in wireless sensor networks is mainly aimed
at the following aspects: (1) against attacks in the network, (2) identifying malicious
Fang et al. J Wireless Com Network (2021) 2021:14 Page 6 of 20
nodes and detecting malicious behavior, (3) improving the security of data storage. The
scholars evaluate the proposed scheme through metrics such as accuracy, robustness,
energy consumption, throughput, calculation overhead and data loss rate. In conclusion,
the introduction of trust management provides higher security and higher efficiency for
wireless sensor networks.
not gain any seed-related information. E-LEACH was compared to LEACH in terms of
energy consumed [31]. However, the additional energy consumption due to encryption
did not be analyzed.
The nodes in WSNs had limited computational ability and limited energy. These device
constraints dictated the choice of various crypto primitives for the security model.
Kodali et al. considered a stream cipher algorithm, RC-4, which was easy to implement
on the sensor devices fast enough. Hence, it was chosen for the performance evalua-
tion of multi-level secure LEACH. In general, the RC-4 used a static key for the encryp-
tion and decryption processes. This static key was replaced by a dynamic key, which was
computed using the Toeplitz hash function in making the security model further stur-
dier. The security overhead due to RC-4 on the life-time of the network had been ana-
lyzed by developing a model for LEACH protocol. The average energy of the network
and the number of dead nodes were evaluated under three different levels models for
LEACH protocol. These results showed that levels 1, 2 and 3 without security fare better
than level 1, 2 and 3 models when security was included. Also, higher level LEACH per-
formed better than the lower levels of LEACH [32]. Toeplitz Hash algorithm was more
suitable for multi-process load balancing, and it could not apply in single-process MCU.
Mezrag et al. proposed a new secure protocol based on the LEACH routing proto-
col named hybrid cryptography-based scheme for secure data communication in clus-
ter-based WSN (HCBS). As a multi-constrained criteria approach, HCBS was built on
a combination of the cryptography technique based on elliptic curves to exchange keys
that used symmetric keys for data encryption and MAC operations. After a set of tests
on TOSSIM simulator, the results obtained showed that the proposal achieved good
performances in terms of energy consumption, average packet loss rate and end-to-end
delay compared with SecLEACH. In addition, HCBS guaranteed a high level of security
[33]. Although the cryptography technique based on elliptic curves had high security
strength, it is difficult to support the long-term operation of WSN.
Saadawy and Shaaban proposed MS-LEACH to enhance the security of SLEACH by
providing data confidentiality and node to cluster head (CH) authentication using pair-
wise keys shared between CHs and their cluster members. The security analysis of pro-
posed MS-LEACH showed that it had efficient security properties and achieves all WSN
security goals compared to the existing secured solutions of LEACH protocol. A sim-
ulation-based performance evaluation of MS-LEACH demonstrated the effectiveness
of proposed MS-LEACH protocol and showed that the protocol achieves the desired
security goals and outperforms other protocols in terms of the energy consumption, the
network lifetime, the network throughput and the normalized routing load [34]. The
pair-wise keys shared between CHs and their cluster members could defend against the
external attacks instead of the internal.
In order to save node energy and enhance wireless sensor network security, the
LEACH protocol has been improved. Zhang and Wei presented a routing protocol
based on clusters in which the sensing area consists of a number of equilateral hexa-
gons called clusters, and each of clusters had six equilateral triangles called cells. All
cells had equal number nodes and then all clusters had equal number nodes. The cell
heads were selected in each cell and then a cluster head was chosen from those six
cell heads. The data were sent to the base station through employing a multi-jumping
Fang et al. J Wireless Com Network (2021) 2021:14 Page 8 of 20
manner along a routing path consisting of cluster heads. In a certain grid, nodes
established pair-wise keys by utilizing the polynomial key management and ID-based
key management. The arithmetic balanced energy expense among all the nodes, saved
the node energy and prolonged the life of wireless sensor networks. Additionally, this
arithmetic improved the security of the wireless sensor network [35].
Wang et al. put forward a kind of secure LEACH routing protocol (SC-LEACH)
based on low-power CH selection algorithm. This protocol got the total number of
all nodes by their collaboration in selecting, to precisely calculate the present thresh-
olds with which the cluster heads are generated. Consequently, the probability of
producing optimal cluster heads in each round was the biggest, and the variance was
the smallest; thus, the network reached its optimal energy cost. The adoption of pre-
shared key pair dispatch improved the security of the routing effectively. The perfor-
mance of the two algorithm were compared synthetically by the following five index:
survived nodes in every round, total energy cost of all nodes, cluster heads produced
in every round, average energy cost of every round, sample second-order central
moments of the CHs in every round. Comparing with the LEACH protocol using the
symmetric keys dispatch, they validated the effectiveness of SC-LEACH by simula-
tion. SC-LEACH protocol used pre-shared key pair, so it was certainly much more
secure than LEACH protocol using the symmetric keys dispatch [36].
To address the issues of the early death of nodes, Zhou et al. proposed an improved
LEACH target location constraint (LEACH-TLC) algorithm. In this algorithm, a net-
work monitoring performance parameter model was constructed to obtain the wake-
up/dormant threshold of the network node. Moreover, by using this threshold, the
dormant strategy of node was designed to establish the working node set. Finally,
combined with the distance factor between this node and BS, a new cluster head
selection rule was proposed. The LEACH-TLC algorithm could reduce the number of
working nodes and energy consumption of the network, balance the energy consump-
tion distribution of the nodes and prolong network lifetime [37].
As a cluster-based routing protocol, LEACH is widely used in WSNs. Amirthal-
ingam and Anuratha proposed an improved LEACH protocol, named I-LEACH. This
proposed protocol improved the algorithm of electing cluster head nodes for LEACH
protocol. They considered the LEACH protocol relied on random threshold probabil-
ity to elect cluster head nodes, and then designed and introduced two score func-
tions for energy consumption and the distance from BS. The two score functions were
weighted and then summed, and then, the random threshold probability is added.
Multiply to get the new threshold probability function [38]. However, because it does
not consider security issues, WSNs are vulnerable to attacks, affecting the security of
the network. Therefore, many researchers have improved LEACH. Most researchers
use encryption and authentication algorithms to protect data, thereby increasing net-
work security. Protocols are usually evaluated using metrics such as energy consump-
tion, network lifetime and packet delivery rate. However, the secure routing protocols
improve network security at the expense of energy efficiency. Simultaneously, many
secure LEACHs are based on the assumption, which is the CH is trusted, while this
assumption cannot be guaranteed in practical applications of WSN.
Fang et al. J Wireless Com Network (2021) 2021:14 Page 9 of 20
n!
Bin(n, k) = pk (1 − p)n−k (1)
k!(n − k)!
(a + b)! a
Ri,j = Bin(a + b, a) = p (1 − p)b (2)
a!b!
Since Ri,j is the probability distribution function, and its maximum value represents
the greatest probability of p, thereby, the maximum value is defined as the trust value of
node i to node j, this is, the direct trust value DT i,j.
′
(a + b)! a
′
Ri,j = p (1 − p)b =0 (3)
a!b!
Fang et al. J Wireless Com Network (2021) 2021:14 Page 10 of 20
a
p= (4)
a+b
3. Trust initialization
Generally, the trust values of all nodes in WSNs are defined as the same initial
value, and all nodes are normal. We assume that the trust value is 0.5 for each node,
and a is equal to b. Both of them are not 0.
In the initialization phase, if a and b are set to smaller, this is, there are few inter-
actions between node i and node j. The obtained trust values are evidently not accu-
rate enough. For example, when interference occurs, the interaction failure is caused
by non-malicious nodes, and the evaluation of the trust value has a greater impact.
In contrast, if a and b have larger values, the historical weight will be increased. It
will impact on the subsequent trust evaluation eventually. The convergence time for
the trust value will become longer, and it may affect the normal operation of the net-
work. Thereby, the initial a and b should be set the appropriate values. Usually a and
b are set to 5.
4. Trust synthesis
IT i,j = DT CH ,j (6)
� �
0.5
if �DTi,j − ITi,j � < ξ
= | DT
DTi,j −ITi,j |
(8)
� �
wind else if ξ ≤ �DTi,j − ITi,j � < 1 and 0.5 < DTi,j
i,j
0 otherwise
where ξ represents a deviation between the direct trust value and the indirect trust
value. Usually, ξ is less than 10% of the initial trust value. The synthesized indirect trust
value can defend against the slander attacks. Due to the CH’s trustworthiness, the collu-
sion attacks can be mitigated effectively.
Fang et al. J Wireless Com Network (2021) 2021:14 Page 11 of 20
3.2 Environment domain
Generally speaking, in many improved schemes for cluster head election, the residual
energy of node and the distance between node and BS are considered and introduced
to elect an optimal cluster head. Nonetheless, we have noticed that the environment
domain is an important factor for large-scale WSN. This is due to the fact that the
local harsh environment will impact on the transmission of information. If a node
with poor external environment is elected as a cluster head, it will affect the stable
operation of the network and shorten the network lifetime. Hence, we study the envi-
ronmental factor, which expresses as follows:
k
0 M k (i) < Mmin
M(i)−M k k k k k
min − 1 M
N min ≤ M (i) < ML , N > 1, ML = log N 2 + Mmin
k k k k
Eenv (i) = 1 ML ≤ M (i) ≤ MH
M k −M(i) k k , N > 1, M k = M k
< M k (i) ≤ Mmax
N max − 1 MH max − log N 2
H
0 k
Mmax < M (i)k
(9)
k (i) is an environmental domain parameter created by the sensor node i for
where Eenv
environmental factor k, which represents temperature, humidity or radiation. MLk , MH
k
is the normal operating interval of the sensor node i for the environmental
factor k. If
the environmental data collected by the node ( M (i)) is within the range MLk , MH
k k
, it
can be considered that the performance of the sensor node i will not be affected by envi-
ronmental factors k. So, Eenv
k (i) is set to 1. Otherwise, it will be reduced, and the negative
3.3 Security domain
To enhance the security, we introduce the trust values as one of the dimensions in the
electing cluster head phase. The candidate cluster head nodes in the current round
process take into account the trust value factor of the last round of cluster head dis-
tribution to the nodes in the cluster. The trust value is obtained by Eq. (8). We define
TVave is all nodes’ average trust value in the last round of cluster. The security domain
for node j is represented by STV j , which is expressed as the following expression:
Ti,j − TVave
STV j = (10)
TVave
when an abnormality is detected for a node, which trust value may be much lower than
TVave, and then STV j < 0, so that reduces the probability of a malicious node being
of the node j. dBS−max is the maximum distance from nodes to BS. dBS j is a distance
from node j to BS. P represents the probability that the sensor node defaults to the clus-
ter head node, G represents a group of sensors that have not become a cluster head node
during the previous (1/P) round, and r represents the current round process. ωeng , ωd ,
ωenv and ωTV are the dimension weights, which represent the energy domain, the dis-
tance domain, the environment domain and the security domain, respectively. They sat-
isfy the following expression:
Step 1 In the first round, the cluster head selection phase and the stabilization
phase of the LEACH are directly performed. The current information (including
trust value) of each cluster member is transmitted to the BS through the control
packet through via cluster heads. The Eeng and dBS of each node can be obtained.
Usually, ωeng , ωd , ωenv and ωTV are set as 0.25, respectively.
Step 2 Based on the received information, the BS calculates and broadcasts TVave.
Step 3 Each cluster member broadcasts a control packet to a node within a preset
radius of the cluster and simultaneously confirms the number of neighbor nodes
by the number of received control packets;
Step 4 Each cluster member qualifies to be a cluster head node compared with
Eq. (11) threshold function to determine whether it can become the cluster head
of the current round process.
Step 5 The stabilization process is based on the LEACH protocol. The nodes in
the cluster transmit the collected information and the current node information
(including trust value) to the cluster head through the data packet and control
packet, respectively, and the data are compressed by the cluster head and trans-
mitted to the BS.
Step 6 Repeating the steps from Step 2 to Step 5.
Step 7 This algorithm ends when there are too many nodes dying.
Fang et al. J Wireless Com Network (2021) 2021:14 Page 13 of 20
4.1 Experimental methods
In this subsection, the MATLAB is used to simulate and compare our proposed proto-
col with LEACH, I-LEACH and LEACH-TLC. To conveniently understand the results,
we provide explanations of the following terms. The network lifetime is represented as
the number of alive nodes, and the first node dead (FND) and ENL (End of Network
Lifetime) were further measured by four algorithms. The ENL refers to the dead nodes
exceeding 98% of the total nodes. In addition, in order to verify the impact of the intro-
duced trust values on security, the security attack, i.e., discarding data packets, will be
regarded as interferences to impose on the network during certain periods of time dur-
ing protocol operation. The specific simulation parameters are shown in Table 1.
The impact of environment domain (wildfire, heavy rain) uses a radiation model [40].
In this model, the impact of the environmental event decreases with increase in dis-
tance from the center of the event. In environment domain, the temperature of the event
center will inevitably destroy the sensor node, and as the distance increases, the temper-
ature will become lower, and the failure probability of the sensor node will also decrease
accordingly. Rainstorm events adopt the uniform distribution pattern of natural obser-
vation. In this model, the event area is massive, and the impact of the event on the sen-
sor nodes in the area is exactly the same. Depending on the severity of the rainstorm, the
affected nodes will experience performance degradation or complete failure.
For the convenience of analysis, the threshold functions of LEACH [12], LEACH-TLC
[37] and I-LEACH [38] are shown in Eqs. (13), (14) and (16), respectively. In LEACH, the
principle for electing cluster heads is to randomly generate a random number between
0 and 1. If the generated random number of a node is less than the threshold value T(i),
the node is elected and announced as the cluster head. In each round, if a node has been
elected as the cluster head, then set T(i) to 0, so that the node will not be repeatedly
elected as the cluster head. For the node that has not been elected as the cluster head,
it will be elected with the probability of T(i). When the number of cluster head nodes
increases, the probability of the remaining nodes being elected increases as the clus-
ter head, this is, the threshold T(i) increases, and the probability of a node generating a
random number less than T(n) also increases. When there is only one node that is not
elected as the cluster head, T(i) is set to 1. Here, T(i) can be expressed as:
P
, if i ∈ G
1
T (i) = 1−P r mod P (13)
0, if i ∈
/G
where P is the proportion of cluster heads in all nodes, r is the current round, and
r mod P1 represents the number of nodes that have been elected as cluster heads in this
round. G is the set of nodes that have not been elected cluster heads in this round.
n
�
P + �T (si ) + (1/n) (�T (si )), if i ∈ G
T (si ) = i=1 (14)
0, if i ∈
/G
Here,
�T (si )=αEpavg (si )+β(1 − ωst (si ))+γ (1 − ωss (si )) (15)
where P is the desired percentage of CHs in a WSN, �T (si ) is the threshold compen-
sation value that the node si becomes the CH, Epavg (si ) is the RE rate of the node si ,
ssssωst (si ) is the distance factor between the target and node si , ωss (si ) is the distance
factor between the node si and the BS, and α, β, γ represent the weight factors of the
threshold, their values are changing with the monitoring area, the monitoring environ-
ment and the energy consumption of the nodes,
P , if i ∈ G
Ecurrent dBS 1
T (i) = w1 + w2 1−P r mod P (16)
Emax dfar 0, if i ∈
/G
where w1 + w2 = 1, and both of them are given according to the preference for the energy
and distance of the network. dBS is distance between the node and BS, and dfar is dis-
tance to the BS from the farthest node of the cluster. Ecurrent represents the residual
energy of a node, and Emax represents the maximum energy of a node. For LEACH-TLC
and I-LEACH, their T(i)s decrease based on the requirements of load balancing to fur-
ther improve the energy efficiency. Thereby, how to reasonably reduce T(i) to meet the
energy efficiency and security requirements is also our concern.
1. Energy consumption
Fang et al. J Wireless Com Network (2021) 2021:14 Page 15 of 20
can be clearly seen that the energy consumption of LEACH is always higher than MSCR,
LEACH-TLC and I-LEACH. Due to the dormant strategy of node, the energy consump-
tion of LEACH-TLC is the smallest in the four protocols.
When the network operation reaches the middle stage, all of them consume a large
amount of energy. The energy consumption is relatively slow in the middle stage to
end stage. It can be seen in Fig. 1 that MSCR, LEACH-TLC and I-LEACH have lower
energy consumption. This is due to that the energy consumption and transmission are
both taken into account. Among them, the MSCR also has environmental awareness,
which can make it avoid dangerous areas and elect more suitable node as CH. There-
fore, MSCR has the lowest energy consumption. In LEACH, when the network oper-
ates to about 280 rounds, its residual energy is only 7%. When the network operates to
596 rounds in I-LEACH, the residual energy is 7%. When the network operates to 1000
rounds in MSCR and LEACH-TLC, the residual energy is still 10% and 12%, respectively.
2. Network lifetime
The curves of the number of alive nodes with the network operation time are shown
in Fig. 2 based on LEACH, I-LEACH, LEACH-TLC and MSCR. In Fig. 2, the FND of
LEACH appeared in the 56th round until the ENL in the 420th round, and the FND in
I-LEACH appeared in the 70th round until there were about 5 nodes left in the 800th
round. For MSCR, the FND appeared in the 82nd round. Until the 1000th round, about
8 nodes are still alive. For LEACH-TLC, the FND appeared in the 95nd round. Until the
1000th round, about 5 nodes are still alive.
In Table 2, it has shown the comparison with the FND and ENL of LEACH, I-LEACH,
LEACH-TLC and MSCR. The data were averaged for multiple simulations. The FND
Fang et al. J Wireless Com Network (2021) 2021:14 Page 17 of 20
LEACH 56 420
I-LEACH 70 930
LEACH-TLC 95 1000 +
MSCR 90 1000 +
Improved 61% 114%
in I-LEACH appeared later, and its network stability increased by 25% compared to
LEACH. Meanwhile, compared with LEACH, the network stability of MSCR and
LEACH-TLC had increased by 61% and 69%, respectively, and both of network lifetimes
had extended by 138%. When the simulation ended, the number of alive nodes in MSCR
is more than the number of alive nodes in LEACH-TLC. This is due to the fact that the
consideration of security could enhance the availability during a long term operation of
the network.
This is due to that, I-LEACH, LEACH-TLC and MSCR consider energy consumption
and distance to make energy consumption more balanced, the network lifetimes of the
three are longer than LEACH. However, I-LEACH and LEACH-TLC do not consider
the impact of environmental factors, and the cluster head node cannot be avoided to
avoid dangerous areas, so the network lifetime is shortened. In contrast, MSCR can bet-
ter extend the network lifetime because of its environmental awareness.
5 Conclusions
For large-scale wireless sensor network, a single planar routing protocol in the net-
work has not only a slow convergence rate, but also a complex network topology
reduces the reliability and accuracy of the data transmission process, although it has
better robustness. Therefore, both simplifying the network topology and improving
the transmission efficiency in secure need to be considered comprehensively. In gen-
eral, the network is self-governed by a hierarchical routing protocol, which can effec-
tively cope with large-scale application scenarios. The improvement of security in
hierarchical routing protocols mainly depends on the deployment of traditional secu-
rity scheme such as encryption or authentication. However, the constrained resources
of sensor node limit the application of high-strength security algorithms, the encryp-
tion and authentication schemes cannot defend against the internal attacks. Thereby,
Fang et al. J Wireless Com Network (2021) 2021:14 Page 18 of 20
we try adopting the trust value into the design of hierarchical routing protocol, and
look forward to improving transmission security and preventing the internal attacks
while reducing computing overhead.
The contribution of this paper is to propose a multidimensional secure clustered
routing scheme,(MSCR), which can improve the availability of the network, prolong
the lifetime of the network and enhance the network security. By using the residual
energy, distance and environment factors, the size of the cluster can be better con-
strained to improve energy efficiency, and avoid excessive energy consumption of a
node. Simultaneously, the LTMS is introduced into MSCR. Specifically, the related
attributes of the trust value are introduced in the cluster head election process, so
that the protocol is improved in energy efficiency and the security is also enhanced
accordingly.
The simulation results showed that MSCR outperforms LEACH-TLC, I-LEACH and
LEACH in prolonging the network lifetime and balancing energy consumption. It can be
seen from the simulation experiment of the number of data packets that the introduc-
tion of trust value in binomial-based trust management scheme can effectively mitigate
the influence of malicious nodes on cluster head election, which can greatly guarantee
the security of the overall network. In the near future, we will research and analyze the
impact of different distributions on secure routing protocols in hierarchical wireless sen-
sor networks.
Abbreviations
IoT: Internet of Things; WSN: Wireless sensor network; CH: Cluster head; BS: Base station; LTMS: Lightweight trust manage-
ment scheme; MSCR: Multidimensional secure clustered routing; LEACH: Low energy adaptive clustering hierarchy;
I-LEACH: Improved LEACH; AAWBAN: Anonymous authentication for wireless body area networks; PT: Predictability trust.
Acknowledgements
We are grateful to the anonymous reviewers who have contributed to the enhancement of the paper’s completeness
with their valuable suggestions.
Authors’ contributions
The six authors of the paper have extensively participated in all of the paper writing. WF mainly worked on the
researched. WZ, WC and JL revised this paper. YN and YY mainly added to and revised the related works. All of the
authors equally contributed to reviewing the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China (Grant Nos. 51874300, 61571303),
the National Science and Technology Major Project of China (Grant No. 2018ZX03001031), the National Natural Sci-
ence Foundation of China and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base
and Low Carbon (Grant No. U1510115), the Qing Lan Project, the China Postdoctoral Science Foundation (Grant No.
2013T60574), the Shanghai Municipal Key Project (Grant No. 19511132401), the Shanghai Municipal Natural Science
Foundation (Grant No. 18ZR1437600), the Fundamental Research Funds for State Key Laboratory of Synthetical Auto-
mation for Process Industries (Grant No. PAL-N201703) and the National Key Research and Development Program of
China—Internet of Things and Smart City Key Program (Nos. 2019YFB2101600, 2019YFB2101602, 2019YFB2101602-03).
Competing interests
The authors declare that they have no competing interests.
Author details
1
Science and Technology on Micro‑system Laboratory, Shanghai Institute of Micro‑system and Information Technology,
Chinese Academy of Sciences, Shanghai 201800, China. 2 University of Chinese Academy of Sciences, Beijing 100049,
China. 3 School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116,
China. 4 School of Engineering and Information Technology, University of New South Wales, Canberra 2610, Australia.
5
School of Data Science and Media Intelligence, Communication University of China, Beijing 100024, China. 6 Shanghai
Fang et al. J Wireless Com Network (2021) 2021:14 Page 19 of 20
Research Center for Wireless Communication, Shanghai 201210, China. 7 Fuzhou Internet of Things Open Lab Co., Ltd.,
350015, Fuzhou, China.
References
1. H. Cheng, Z. Xie, L. Wu, Z. Yu, R. Li, Data prediction model in wireless sensor networks based on bidirectional LSTM. J.
Wirel. Commun. Netw. 2019, 203 (2019). https://doi.org/10.1186/s13638-019-1511-4
2. N. Liu, J. Pan, T. Nguyen, A bi-population quasi-affine transformation evolution algorithm for global optimization and
its application to dynamic deployment in wireless sensor networks. J Wirel. Commun. Netw. 2019, 175 (2019). https
://doi.org/10.1186/s13638-019-1481-6
3. H. Cheng, D. Feng, X. Shi, C. Chen, Data quality analysis and cleaning strategy for wireless sensor networks. J Wirel.
Commun. Netw. 2018, 61 (2018). https://doi.org/10.1186/s13638-018-1069-6
4. W. Guo, W. Zhu, Z. Yu, J. Wang, B. Guo, A survey of task allocation: contrastive perspectives from wireless sensor
networks and mobile crowdsensing. IEEE Access 7, 78406–78420 (2019)
5. W. Fang, N. Cui, W. Chen, W. Zhang, Y. Chen, A trust-based security system for data collecting in smart city. IEEE Trans.
Ind. Inf. 1, 1 (2020). https://doi.org/10.1109/TII.2020.3006137
6. H. Cheng, Z. Su, N. Xiong, Y. Xiao, Energy-efficient node scheduling algorithms for wireless sensor networks using
Markov random field model. Inf. Sci. 329, 461–477 (2016). https://doi.org/10.1016/j.ins.2015.09.039
7. X. Zheng, W. Zheng, Y. Yang, W. Guo, V. Chang, Clustering based interest prediction in social networks. Multimed.
Tools Appl. 78, 32755–32774 (2019). https://doi.org/10.1007/s11042-018-7009-y
8. C.-H. Chen, F.-J. Hwang, H.-Y. Kung, Travel time prediction system based on data clustering for waste collection
vehicles. IEICE Trans. Inf. Syst. E102.D(7), 1374–1383 (2019). https://doi.org/10.1587/transinf.2018EDP7299
9. X. Wu, X. Zhang, An efficient pixel clustering-based method for mining spatial sequential patterns from serial
remote sensing images. Comput. Geosci. 124, 128–139 (2019). https://doi.org/10.1016/j.cageo.2019.01.005
10. Z. He, C. Yu, Clustering stability-based evolutionary K-means. Soft Comput. 23, 305–321 (2019). https://doi.
org/10.1007/s00500-018-3280-0
11. X. Liao, L. Zhang, J. Wei, D. Yang, G. Chen, Recommending mobile microblog users via a tensor factorization based
on user cluster approach. Wirel. Commun. Mobile Comput. 2018, 11 (2018). https://doi.org/10.1155/2018/9434239
12. W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless micro-
sensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS ’00),
January 2000.
13. Z. Ning, X. Hu, Z. Chen et al., A cooperative quality aware service access system for social internet of vehicles. IEEE
Int. Things J. 5(4), 2506–2517 (2018)
14. Z. Ning, F. Xia, X. Hu et al., Social-oriented adaptive transmission in opportunistic internet of smartphones. IEEE Trans.
Ind. Inf. 13(2), 810–820 (2017)
15. Z. Ning, L. Liu, F. Xia et al., CAIS: A Copy Adjustable incentive scheme in community-based socially-aware network-
ing. IEEE Trans. Veh. Technol. 66(4), 3406–3419 (2017)
16. X. Wang, Z. Ning, M. Zhou et al., Privacy-preserving content dissemination for vehicular social networks: challenges
and solutions. IEEE Commun. Surv. Tutor. 21(2), 1314–1345 (2019)
17. W. Fang, W. Zhang, Y. Yang, Y. Liu, W. Chen, A resilient trust management scheme for defending against reputation
time-varying attacks based on BETA distribution. Sci. China Inf. Sci. 60(4), 040305 (2017)
18. W. Fang, C. Zhang, Z. Shi, Q. Zhao, L. Shan, BTRES: beta-based trust and reputation evaluation system for wireless
sensor networks. J. Netw. Comput. Appl. 59(1), 84–92 (2016)
19. Y. Chae, L.C. DiPippo, Y.L. Sun, Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 26(4),
1178–1191 (2015)
20. Y. Ren, V.I. Zadorozhny, V.A. Oleshchuk, F.Y. Li, A novel approach to trust management in unattended wireless sensor
networks. IEEE Trans. Mob. Comput. 13(7), 1409–1423 (2014)
21. S.A. Hussain, I. Raza, M.M. Mehdi, A cluster based energy efficient trust management mechanism for medical wire-
less sensor networks (MWSNs), in 2018 5th International Conference on Electrical and Electronic Engineering (ICEEE),
Istanbul (2018), pp. 433–439
22. N. Labraoui, A reliable trust management scheme in wireless sensor networks, in 2015 12th International Symposium
on Programming and Systems (ISPS), Algiers (2015), pp. 1–6.
23. F. Fang, J. Li, J. Li. A reputation management scheme based on multi-factor in WSNs, in Proceedings 2013 International
Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shengyang (2013), pp. 3843–3848
24. N. Zhou, W. Fang, W. Zhang, X. Lv, J. Huang, A novel trust management scheme for defending against on-off attack
based on gaussian distribution, in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green
Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), Halifax, NS, Canada (2018), pp. 1806–1811.
25. A.M. Kowshalya, M.L. Valarmathi, Trust management for reliable decision making among social objects in the Social
Internet of Things. IET Netw. 6(4), 75–80 (2017)
26. X. Wu, J. Huang, J. Ling, L. Shu, BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access 7,
43679–43690 (2019)
27. G. Han, Y. He, J. Jiang, N. Wang, M. Guizani, J.A. Ansere, A synergetic trust model based on SVM in underwater acous-
tic sensor networks. IEEE Trans. Veh. Technol. 68(11), 11239–11247 (2019)
Fang et al. J Wireless Com Network (2021) 2021:14 Page 20 of 20
28. W. Fang, C. Zhu, W. Chen, W. Zhang, J.J.P.C. Rodrigues, BDTMS: binomial distribution-based trust management
scheme for healthcare-oriented wireless sensor network, in 2018 14th International Wireless Communications &
Mobile Computing Conference (IWCMC), Limassol (2018), pp. 382–387.
29. Ouafaa, E. Mustapha, K. Salah-ddine, E.H. Said, A new secure solution for clustering in wireless sensors networks
based on LEACH, in 2017 International Conference on Engineering and Technology (ICET), Antalya (2017), pp. 1–5.
30. J. Barad, B. Kadhiwala. DIST-LEACH: a deterministic key management scheme for securing cluster-based sensor net-
works. in 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), Unnao (2014),
pp. 1–5.
31. H.B. Patel, D.C. Jinwala, E-LEACH: improving the LEACH protocol for privacy preservation in secure data aggregation
in Wireless Sensor Networks, in 2014 9th International Conference on Industrial and Information Systems (ICIIS), Gwalior
(2014), pp. 1–5.
32. R.K. Kodali, S.K. Gundabathula, L. Boppana, Multi level secure LEACH protocol model using NS-3, in 2014 First Interna-
tional Conference on Networks & Soft Computing (ICNSC2014), Guntur (2014), pp. 198–202.
33. F. Mezrag, S. Bitam, A. Mellouk. Secure routing in cluster-based wireless sensor networks, in GLOBECOM 2017—2017
IEEE Global Communications Conference, Singapore (2017), pp. 1–6.
34. M. El_Saadawy, E. Shaaban, Enhancing S-LEACH security for wireless sensor networks, in 2012 IEEE International
Conference on Electro/Information Technology, Indianapolis, IN (2012), pp. 1–6.
35. Y. Zhang, L. Wei, Improving the LEACH protocol for wireless sensor networks, in IET International Conference on Wire-
less Sensor Network 2010 (IET-WSN 2010), Beijing (2010), pp. 355–359.
36. J. Wang, G. Yang, S. Chen, Y. Sun, Secure LEACH routing protocol based on low-power cluster-head selection algo-
rithm for wireless sensor networks, in 2007 International Symposium on Intelligent Signal Processing and Communica-
tion Systems, Xiamen (2007), pp. 341–344
37. L. Zhou, Y. Fang, Q. Wei, Y. Jin, Z. Hu, LEACH-TLC: a strategy of reducing and uniform energy consumption based on
target location constraint. IET Wirel. Sens. Syst. 9(6), 347–357 (2019)
38. K. Amirthalingam, Anuratha, Improved LEACH: a modified LEACH for wireless sensor network, in IEEE International
Conference on Advances in Computer Applications (ICACA), Coimbatore (2016), pp. 255–258.
39. W. Fang, L. Zhang, Z. Shi, Y. Sun, L. Shan, Binomial-based trust management system in wireless sensor networks.
Chin. J. Sens. Actuators 28(5), 703–708 (2015)
40. P. Nayak, A. Devulapalli, A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sens.
J. 16(1), 137–144 (2016)
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.