Distributed Secure Clustering Protocol in Wireless Sensor Networks
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The cluster-based hierarchical topology control has been widely studied and applied in wireless sensor networks. But because of the open nature and limited resource of the sensor network, clustering protocols are vulnerable to the misuse and disruption attacks from the adversaries. As a result, the security of the clustering protocols is a basic requirement for its wide application. A distributed secure clustering protocol is proposed, in which the secure network initialization, random number broadcast from the base station and one-way hash chain are used to achieve the resiliency against possible attacks including node personating, cluster-head occupying, malicious cluster-member recruiting and multiple cluster-membership attacks. The security and cost of the protocol are evaluated and the results show the resiliency and efficiency of the proposed protocol.

    Reference
    Related
    Cited by
Get Citation

余 磊,李建中,骆吉洲.一种无线传感器网络分布式安全成簇协议.软件学报,2009,20(10):2705-2720

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 07,2008
  • Revised:May 07,2009
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063