SCAF

A secure cluster-based architecture formation scheme for wireless sensor network

WenCheng Yang, YiYing Zhang, KeeBum Kim, JungHwan Kim, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Nowadays, there has been an explosive growth in the research devoted to the area of hierarchical architecture for its extraordinary performance on energy-saving and special applications. However, because the nature of security threats in wireless sensor networks (WSNs) as well as the nature of WSN itself raises additional security challenges, new schemes and architectures are needed to prevent the network from these threatens. In this paper, we propose a secure architecture formation scheme which uses a bidirectional evaluation mechanism to securely form a hierarchical architecture for WSNs. Our experimental results show that our proposed scheme achieves better performance than other hierarchical architecture formation schemes.

Original languageEnglish
Title of host publication2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC
Pages843-847
Number of pages5
DOIs
Publication statusPublished - 2008 Sep 5
Event2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC - Shanghai, China
Duration: 2008 May 262008 May 28

Other

Other2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC
CountryChina
CityShanghai
Period08/5/2608/5/28

Fingerprint

Wireless sensor networks
Energy conservation

ASJC Scopus subject areas

  • Hardware and Architecture
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Yang, W., Zhang, Y., Kim, K., Kim, J., & Park, M. S. (2008). SCAF: A secure cluster-based architecture formation scheme for wireless sensor network. In 2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC (pp. 843-847). [4536876] https://doi.org/10.1109/ICCSC.2008.184

SCAF : A secure cluster-based architecture formation scheme for wireless sensor network. / Yang, WenCheng; Zhang, YiYing; Kim, KeeBum; Kim, JungHwan; Park, Myong Soon.

2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC. 2008. p. 843-847 4536876.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yang, W, Zhang, Y, Kim, K, Kim, J & Park, MS 2008, SCAF: A secure cluster-based architecture formation scheme for wireless sensor network. in 2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC., 4536876, pp. 843-847, 2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC, Shanghai, China, 08/5/26. https://doi.org/10.1109/ICCSC.2008.184
Yang W, Zhang Y, Kim K, Kim J, Park MS. SCAF: A secure cluster-based architecture formation scheme for wireless sensor network. In 2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC. 2008. p. 843-847. 4536876 https://doi.org/10.1109/ICCSC.2008.184
Yang, WenCheng ; Zhang, YiYing ; Kim, KeeBum ; Kim, JungHwan ; Park, Myong Soon. / SCAF : A secure cluster-based architecture formation scheme for wireless sensor network. 2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC. 2008. pp. 843-847
@inproceedings{c4c5272f1f6f449aa96b8a7ee0832b37,
title = "SCAF: A secure cluster-based architecture formation scheme for wireless sensor network",
abstract = "Nowadays, there has been an explosive growth in the research devoted to the area of hierarchical architecture for its extraordinary performance on energy-saving and special applications. However, because the nature of security threats in wireless sensor networks (WSNs) as well as the nature of WSN itself raises additional security challenges, new schemes and architectures are needed to prevent the network from these threatens. In this paper, we propose a secure architecture formation scheme which uses a bidirectional evaluation mechanism to securely form a hierarchical architecture for WSNs. Our experimental results show that our proposed scheme achieves better performance than other hierarchical architecture formation schemes.",
author = "WenCheng Yang and YiYing Zhang and KeeBum Kim and JungHwan Kim and Park, {Myong Soon}",
year = "2008",
month = "9",
day = "5",
doi = "10.1109/ICCSC.2008.184",
language = "English",
isbn = "9781424417087",
pages = "843--847",
booktitle = "2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC",

}

TY - GEN

T1 - SCAF

T2 - A secure cluster-based architecture formation scheme for wireless sensor network

AU - Yang, WenCheng

AU - Zhang, YiYing

AU - Kim, KeeBum

AU - Kim, JungHwan

AU - Park, Myong Soon

PY - 2008/9/5

Y1 - 2008/9/5

N2 - Nowadays, there has been an explosive growth in the research devoted to the area of hierarchical architecture for its extraordinary performance on energy-saving and special applications. However, because the nature of security threats in wireless sensor networks (WSNs) as well as the nature of WSN itself raises additional security challenges, new schemes and architectures are needed to prevent the network from these threatens. In this paper, we propose a secure architecture formation scheme which uses a bidirectional evaluation mechanism to securely form a hierarchical architecture for WSNs. Our experimental results show that our proposed scheme achieves better performance than other hierarchical architecture formation schemes.

AB - Nowadays, there has been an explosive growth in the research devoted to the area of hierarchical architecture for its extraordinary performance on energy-saving and special applications. However, because the nature of security threats in wireless sensor networks (WSNs) as well as the nature of WSN itself raises additional security challenges, new schemes and architectures are needed to prevent the network from these threatens. In this paper, we propose a secure architecture formation scheme which uses a bidirectional evaluation mechanism to securely form a hierarchical architecture for WSNs. Our experimental results show that our proposed scheme achieves better performance than other hierarchical architecture formation schemes.

UR - http://www.scopus.com/inward/record.url?scp=50649085699&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=50649085699&partnerID=8YFLogxK

U2 - 10.1109/ICCSC.2008.184

DO - 10.1109/ICCSC.2008.184

M3 - Conference contribution

SN - 9781424417087

SP - 843

EP - 847

BT - 2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC

ER -