An authentication protocol for hierarchy-based wireless sensor networks

KeeBum Kim, YiYing Zhang, WenCheng Yang, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.

Original languageEnglish
Title of host publication2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
DOIs
Publication statusPublished - 2008 Dec 1
Event2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 - Istanbul, Turkey
Duration: 2008 Oct 272008 Oct 29

Other

Other2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
CountryTurkey
CityIstanbul
Period08/10/2708/10/29

    Fingerprint

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Kim, K., Zhang, Y., Yang, W., & Park, M. S. (2008). An authentication protocol for hierarchy-based wireless sensor networks. In 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 [4717946] https://doi.org/10.1109/ISCIS.2008.4717946