{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:53Z","timestamp":1747224113332,"version":"3.40.5"},"reference-count":17,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>Security is the utmost importance for the safe operation of the Internet of Things (IoT) devices. Behind IoT, a sensor network operates. Hence, security and lifetime extensions of the sensor networks are the primary concern. Node clustering is a technique to lengthen the lifetime of sensor networks. In a clustering technique, Cluster Heads (CH) are chosen. To provide the security to the sensor network, reliable CHs are elected. In this article, a protocol is proposed which elects reliable CHs based on node features such as residual energy, distance to the sink and node behavior such as the number of packets transmitted and received successfully, data consistency factor. The simulation results obtained prove that the proposed protocol performs better.<\/jats:p>","DOI":"10.4018\/ijisp.201907010105","type":"journal-article","created":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T14:50:10Z","timestamp":1561560610000},"page":"74-90","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks"],"prefix":"10.4018","volume":"13","author":[{"given":"Deepika","family":"Agrawal","sequence":"first","affiliation":[{"name":"National Institute of Technology Raipur, Raipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7626-9335","authenticated-orcid":true,"given":"Sudhakar","family":"Pandey","sequence":"additional","affiliation":[{"name":"National Institute of Technology Raipur, Raipur, India"}]},{"given":"Veena","family":"Anand","sequence":"additional","affiliation":[{"name":"National Institute of Technology Raipur, Raipur, India"}]}],"member":"2432","reference":[{"key":"IJISP.201907010105-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"2","key":"IJISP.201907010105-1","first-page":"612","article-title":"Clustering-based key renewals for wireless sensor networks.","volume":"92","author":"G. W.Cho","year":"2009","journal-title":"IEICE Transactions on Communications"},{"key":"IJISP.201907010105-2","doi-asserted-by":"crossref","unstructured":"Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust.Cluster Computing, 1\u201316.","DOI":"10.1007\/s10586-017-1622-9"},{"key":"IJISP.201907010105-3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31956-6_53"},{"key":"IJISP.201907010105-4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"IJISP.201907010105-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.008"},{"key":"IJISP.201907010105-6","first-page":"1","article-title":"Security and privacy in the Internet of Things: Current status and open issues.","author":"M. A.Koien","year":"2014","journal-title":"International Conference on Privacy and Security in Mobile Systems (PRISMS)"},{"key":"IJISP.201907010105-7","article-title":"Resilient cluster formation for sensor networks.","author":"D.Liu","year":"2007","journal-title":"27th International Conference on Distributed Computing Systems"},{"key":"IJISP.201907010105-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.006"},{"key":"IJISP.201907010105-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.01.003"},{"key":"IJISP.201907010105-10","unstructured":"NIC. (2008). Disruptive civil technologies: Six technologies with potential impacts on us interests out to 2025."},{"key":"IJISP.201907010105-11","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.48"},{"journal-title":"Securing Cluster Head Selection in Wireless Sensor Networks","year":"2017","author":"R.Singh","key":"IJISP.201907010105-12"},{"key":"IJISP.201907010105-13","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.46"},{"key":"IJISP.201907010105-14","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/301750"},{"key":"IJISP.201907010105-15","unstructured":"Younis, G. G. (2003). Performance evaluation of load-balanced clustering of wireless sensor networks. In 10th international conference on Telecommunications (Vol. 2, pp. 1577-1583). IEEE."},{"key":"IJISP.201907010105-16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.5408575"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=232670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:59:06Z","timestamp":1651780746000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.201907010105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":17,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.201907010105","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}