A rekey-boosted security protocol in hierarchical wireless sensor network

Yi Ying Zhang, Wen Cheng Yang, Kee Bum Kim, Min Yu Cui, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH) to enhance network security and survivability. Compared to other LEACH security solutions, the salient advantage of this work is that a unique rekey mechanism, which can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safe under the timely protection of the rekey mechanism.

Original languageEnglish
Title of host publicationProceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008
Pages57-61
Number of pages5
DOIs
Publication statusPublished - 2008 Sep 12
Event2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Other

Other2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

Fingerprint

Wireless sensor networks
Network protocols
Network security
Redundancy
Cracks

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Science Applications
  • Software

Cite this

Zhang, Y. Y., Yang, W. C., Kim, K. B., Cui, M. Y., & Park, M. S. (2008). A rekey-boosted security protocol in hierarchical wireless sensor network. In Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008 (pp. 57-61). [4505693] https://doi.org/10.1109/MUE.2008.10

A rekey-boosted security protocol in hierarchical wireless sensor network. / Zhang, Yi Ying; Yang, Wen Cheng; Kim, Kee Bum; Cui, Min Yu; Park, Myong Soon.

Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. 2008. p. 57-61 4505693.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhang, YY, Yang, WC, Kim, KB, Cui, MY & Park, MS 2008, A rekey-boosted security protocol in hierarchical wireless sensor network. in Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008., 4505693, pp. 57-61, 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008, Busan, Korea, Republic of, 08/4/24. https://doi.org/10.1109/MUE.2008.10
Zhang YY, Yang WC, Kim KB, Cui MY, Park MS. A rekey-boosted security protocol in hierarchical wireless sensor network. In Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. 2008. p. 57-61. 4505693 https://doi.org/10.1109/MUE.2008.10
Zhang, Yi Ying ; Yang, Wen Cheng ; Kim, Kee Bum ; Cui, Min Yu ; Park, Myong Soon. / A rekey-boosted security protocol in hierarchical wireless sensor network. Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. 2008. pp. 57-61
@inproceedings{53416162e419453ba1a25ee4cc365dab,
title = "A rekey-boosted security protocol in hierarchical wireless sensor network",
abstract = "Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH) to enhance network security and survivability. Compared to other LEACH security solutions, the salient advantage of this work is that a unique rekey mechanism, which can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safe under the timely protection of the rekey mechanism.",
author = "Zhang, {Yi Ying} and Yang, {Wen Cheng} and Kim, {Kee Bum} and Cui, {Min Yu} and Park, {Myong Soon}",
year = "2008",
month = "9",
day = "12",
doi = "10.1109/MUE.2008.10",
language = "English",
isbn = "0769531342",
pages = "57--61",
booktitle = "Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008",

}

TY - GEN

T1 - A rekey-boosted security protocol in hierarchical wireless sensor network

AU - Zhang, Yi Ying

AU - Yang, Wen Cheng

AU - Kim, Kee Bum

AU - Cui, Min Yu

AU - Park, Myong Soon

PY - 2008/9/12

Y1 - 2008/9/12

N2 - Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH) to enhance network security and survivability. Compared to other LEACH security solutions, the salient advantage of this work is that a unique rekey mechanism, which can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safe under the timely protection of the rekey mechanism.

AB - Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH) to enhance network security and survivability. Compared to other LEACH security solutions, the salient advantage of this work is that a unique rekey mechanism, which can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safe under the timely protection of the rekey mechanism.

UR - http://www.scopus.com/inward/record.url?scp=51249104543&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51249104543&partnerID=8YFLogxK

U2 - 10.1109/MUE.2008.10

DO - 10.1109/MUE.2008.10

M3 - Conference contribution

SN - 0769531342

SN - 9780769531342

SP - 57

EP - 61

BT - Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008

ER -