A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things

  • Jianli LiuEmail author
  • Chunzi Chen
  • Yang Cao
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 960)


In order to solve the data transmission security problem of the sensing network, this paper proposes a multi-level trusted clustering mechanism. The proposed mechanism combines multi-level clustering, identity authentication, and trusted computing to solve network expansion problems, reduce energy consumption when ordinary nodes transmit data to aggregation nodes, and ensure that the identity of IOT nodes and the messages are trusted. According to the routing protocol, each sensor node uses a multi-level clustering algorithm to divide each node into multiple levels of clusters. Then it transmits two-way identity authentication and platform integrity authentication to ensure the identity of nodes is trusted. Finally, it adopts a key distribution management method based on vector space to manage keys. Logic analysis and experimental results show that the proposed scheme has a high malicious attack resistance rate and a small amount of computation, which reduces the energy consumption of the IOT nodes during transmission and ensures the security of the transmitted messages.


Internet of Things Multi-level clustering Identity authentication Key distribution 



This work was supported by the National Natural Science Foundation of China (Grant No. 61501007).


  1. 1.
    Potsubay, J., Duduk, V.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRefGoogle Scholar
  2. 2.
    Yassen, M.B., Aljawaerneh, S., Abdulraziq, R.: Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): survey. In: 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp. 1–9 (2016) Google Scholar
  3. 3.
    Bhandary, V., Malik, A., Kumar, S.: Routing in wireless multimedia sensor networks: a survey of existing protocols and open research issues. J. Eng. 2016(7), 1–27 (2016)CrossRefGoogle Scholar
  4. 4.
    Mpanti, A., Nikolopoulos, S.D., Polenakis, I.: Defending hardware-based attacks on trusted computing using a hardware-integrity attestation protocol. In: International Conference on Computer Systems and Technologies, pp. 155–162. ACM (2017)Google Scholar
  5. 5.
    Shen, H., Bai, G.: Routing in wireless multimedia sensor networks: a survey and challenges ahead. J. Netw. Comput. Appl. 71(3), 30–49 (2016)CrossRefGoogle Scholar
  6. 6.
    Ukani, V., Thakkar, P., Parikh, V.: Routing protocols for wireless multimedia sensor networks: challenges and research issues. In: Satapathy, S.C., Joshi, A. (eds.) ICTIS 2017. SIST, vol. 84, pp. 157–164. Springer, Cham (2018). Scholar
  7. 7.
    Shaikh, R., Sasikumar, M.: Trust model for measuring security strength of cloud computing service. Procedia Comput. Sci. 45, 380–389 (2015)CrossRefGoogle Scholar
  8. 8.
    Bhuiyan, M.Z.A., Zaman, M., Wang, G., Wang, T., Wu, J.: Privacy-protected data collection in wireless medical sensor networks. In: 2017 International Conference on Networking, Architecture, and Storage (NAS), Shenzhen, pp. 1–2 (2017)Google Scholar
  9. 9.
    Farouk, F., Rizk, R., Zaki, F.W.: Multi-level stable and energy-efficient clustering protocol in heterogeneous wireless sensor networks. IET Wirel. Sens. Syst. 4(4), 159–169 (2014)CrossRefGoogle Scholar
  10. 10.
    Vandana, A.K., Mohan, C.: Multi-level heterogeneous energy efficient hybrid clustering protocol for wireless sensor network. In: 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), Chandigarh, pp. 1–6 (2015)Google Scholar
  11. 11.
    Merabtine, N., Zegour, D.E., Djenouri, D., Boumessaidia, B.: New PBST-based multi-level clustering protocol for Wireless Sensors Networks. In: 2016 4th International Conference on Control Engineering & Information Technology (CEIT), Hammamet, pp. 1–5 (2016)Google Scholar
  12. 12.
    Rams, T., Pacyna, P.: Self-healing group key distribution with extended revocation capability. In: 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, pp. 347–353 (2013)Google Scholar
  13. 13.
    Rafiq, J.I., Abdullah-Al-Omar, Chakraborty, A., Yusuf, A.: Adaptive secured multicast key management with re-keying process. In: 2016 IEEE Conference on Systems, Process and Control (ICSPC), Bandar Hilir, pp. 181–185 (2016)Google Scholar
  14. 14.
    Janani, V.S., Manikandan, M.S.K.: CRT-KM: Chinese remainder theorem based key management scheme for securing ad-hoc networks. In: 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), Kozhikode, pp. 1–5 (2015)Google Scholar
  15. 15.
    Xu, C., Lu, R., Wang, H., Zhu, L., Huang, C.: TJET: ternary join-exit-tree based dynamic key management for vehicle platooning. IEEE Access 5, 26973–26989 (2017)CrossRefGoogle Scholar
  16. 16.
    Singh, S.K., Kumar, P., Singh, J.P.: A survey on successors of LEACH protocol. IEEE Access 5(99), 4298–4328 (2017)CrossRefGoogle Scholar
  17. 17.
    El-hajj, M., Chamoun, M., Fadlallah, A., Serhrouchni, A.: Analysis of authentication techniques in Internet of Things (IoT). In: 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, pp. 1–3 (2017)Google Scholar
  18. 18.
    Vardhan, A., Hussain, M., Garimella, R.M.: Simple and secure node authentication in Wireless Sensor Networks. International Conference on Recent Advances and Innovations in Engineering, pp. 1–5. IEEE (2017)Google Scholar
  19. 19.
    Peng, Q., Enqing, D., Juan, X., Xing, L., Wei, L., Wentao, C.: Multipath routing protocol based on congestion control mechanism implemented by cross-layer design concept for WSN. In: 2014 IEEE 17th International Conference on Computational Science and Engineering, Chengdu, pp. 378–384 (2014)Google Scholar
  20. 20.
    Ming-hao, T., Ren-lai, Y., Shu-jiang, L., Xiang-dong, W.: Multipath routing protocol with load balancing in WSN considering interference. In: 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, pp. 1062–1067 (2011)Google Scholar
  21. 21.
    Gupta, S.K., Kuila, P., Jana, P.K.: Energy efficient multipath routing for wireless sensor networks: a genetic algorithm approach. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, pp. 1735–1740 (2016)Google Scholar
  22. 22.
    Yuvaraju, M., Rani, K.S.S.: Secure energy efficient load balancing multipath routing protocol with power management for wireless sensor networks. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, pp. 331–335 (2014)Google Scholar
  23. 23.
    Mao, Y., Wei, G.: A secure routing mechanism for wireless sensor network based on multiple feedback-paths. Chin. J. Sens. Actuators 23(10), 1486–1493 (2010)Google Scholar
  24. 24.
    Mao, Y.X.: Secure data collection approach for wireless sensor networks based on multipath routing and feedback. J. Commun. (2010) Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Faculty of Information TechnologyBeijing University of TechnologyBeijingChina

Personalised recommendations