An authentication protocol for hierarchy-based wireless sensor networks

Kee Bum Kim, Yi Ying Zhang, Wen Cheng Yang, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.

Original languageEnglish
Title of host publication2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
DOIs
Publication statusPublished - 2008
Event2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 - Istanbul, Turkey
Duration: 2008 Oct 272008 Oct 29

Publication series

Name2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008

Other

Other2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
CountryTurkey
CityIstanbul
Period08/10/2708/10/29

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'An authentication protocol for hierarchy-based wireless sensor networks'. Together they form a unique fingerprint.

Cite this