An authentication protocol for hierarchy-based wireless sensor networks

KeeBum Kim, YiYing Zhang, WenCheng Yang, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.

Original languageEnglish
Title of host publication2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
DOIs
Publication statusPublished - 2008 Dec 1
Event2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 - Istanbul, Turkey
Duration: 2008 Oct 272008 Oct 29

Other

Other2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
CountryTurkey
CityIstanbul
Period08/10/2708/10/29

Fingerprint

Authentication
Wireless sensor networks
Network protocols
Computer networks
Energy utilization
Topology

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Kim, K., Zhang, Y., Yang, W., & Park, M. S. (2008). An authentication protocol for hierarchy-based wireless sensor networks. In 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 [4717946] https://doi.org/10.1109/ISCIS.2008.4717946

An authentication protocol for hierarchy-based wireless sensor networks. / Kim, KeeBum; Zhang, YiYing; Yang, WenCheng; Park, Myong Soon.

2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008. 2008. 4717946.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, K, Zhang, Y, Yang, W & Park, MS 2008, An authentication protocol for hierarchy-based wireless sensor networks. in 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008., 4717946, 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008, Istanbul, Turkey, 08/10/27. https://doi.org/10.1109/ISCIS.2008.4717946
Kim K, Zhang Y, Yang W, Park MS. An authentication protocol for hierarchy-based wireless sensor networks. In 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008. 2008. 4717946 https://doi.org/10.1109/ISCIS.2008.4717946
Kim, KeeBum ; Zhang, YiYing ; Yang, WenCheng ; Park, Myong Soon. / An authentication protocol for hierarchy-based wireless sensor networks. 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008. 2008.
@inproceedings{5716f17558cf46498350e35d3fa8d95f,
title = "An authentication protocol for hierarchy-based wireless sensor networks",
abstract = "Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.",
author = "KeeBum Kim and YiYing Zhang and WenCheng Yang and Park, {Myong Soon}",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/ISCIS.2008.4717946",
language = "English",
isbn = "9781424428816",
booktitle = "2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008",

}

TY - GEN

T1 - An authentication protocol for hierarchy-based wireless sensor networks

AU - Kim, KeeBum

AU - Zhang, YiYing

AU - Yang, WenCheng

AU - Park, Myong Soon

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.

AB - Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.

UR - http://www.scopus.com/inward/record.url?scp=58449120481&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58449120481&partnerID=8YFLogxK

U2 - 10.1109/ISCIS.2008.4717946

DO - 10.1109/ISCIS.2008.4717946

M3 - Conference contribution

SN - 9781424428816

BT - 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008

ER -