SEC2: a secure and energy efficient barrier coverage scheduling for WSN-based IoT applications

Diya Thomas*, Rajan Shankaran, Mehmet Orgun, Subhas Mukhopadhyay

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)


Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks such as Denial of Service (DoS) poses a challenge for maintaining the desired QoS levels. In this paper, we propose a secure barrier coverage scheduling scheme called SEC2 , which prevents QoS degradation in the event of security breaches. This scheme uses a fully weighted attributed dynamic graph model in which a novel attribute-based weight balancing greedy strategy is used to construct barriers. A weighted averaging-based K-means Spectral, and Hierarchical (WKSH) cluster ensemble scheme is proposed to secure a barrier from malicious attacks. WKSH is a graph-based anomaly detection scheme based on weighted Euclidean distance computation and weighted average consensus. The experimental result shows that SEC2 guarantees the required QoS at all times. Moreover, the proposed WKSH shows better accuracy in the classification and detection of attacks in the barrier.

Original languageEnglish
Pages (from-to)622-634
Number of pages13
JournalIEEE Transactions on Green Communications and Networking
Issue number2
Early online date22 Mar 2021
Publication statusPublished - Jun 2021


  • Anomaly detection
  • barrier coverage
  • dynamic graph
  • Dynamic scheduling
  • energy efficiency
  • green IoT
  • Heuristic algorithms
  • Intrusion detection
  • Quality of service
  • security
  • Standards
  • Wireless sensor networks
  • WSN


Dive into the research topics of 'SEC2: a secure and energy efficient barrier coverage scheduling for WSN-based IoT applications'. Together they form a unique fingerprint.

Cite this