VSCF

A vote-based secure cluster formation scheme

WenCheng Yang, YiYing Zhang, KeeBum Kim, DongSub Kim, MinYu Cui, Ming Xue, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.

Original languageEnglish
Title of host publicationProceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
Pages1174-1178
Number of pages5
DOIs
Publication statusPublished - 2008 Aug 18
Event2008 IEEE International Conference on Networking, Sensing and Control, ICNSC - Sanya, China
Duration: 2008 Apr 62008 Apr 8

Other

Other2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
CountryChina
CitySanya
Period08/4/608/4/8

Fingerprint

Network security
Wireless sensor networks
Energy conservation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Cite this

Yang, W., Zhang, Y., Kim, K., Kim, D., Cui, M., Xue, M., & Park, M. S. (2008). VSCF: A vote-based secure cluster formation scheme. In Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC (pp. 1174-1178). [4525394] https://doi.org/10.1109/ICNSC.2008.4525394

VSCF : A vote-based secure cluster formation scheme. / Yang, WenCheng; Zhang, YiYing; Kim, KeeBum; Kim, DongSub; Cui, MinYu; Xue, Ming; Park, Myong Soon.

Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC. 2008. p. 1174-1178 4525394.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yang, W, Zhang, Y, Kim, K, Kim, D, Cui, M, Xue, M & Park, MS 2008, VSCF: A vote-based secure cluster formation scheme. in Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC., 4525394, pp. 1174-1178, 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC, Sanya, China, 08/4/6. https://doi.org/10.1109/ICNSC.2008.4525394
Yang W, Zhang Y, Kim K, Kim D, Cui M, Xue M et al. VSCF: A vote-based secure cluster formation scheme. In Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC. 2008. p. 1174-1178. 4525394 https://doi.org/10.1109/ICNSC.2008.4525394
Yang, WenCheng ; Zhang, YiYing ; Kim, KeeBum ; Kim, DongSub ; Cui, MinYu ; Xue, Ming ; Park, Myong Soon. / VSCF : A vote-based secure cluster formation scheme. Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC. 2008. pp. 1174-1178
@inproceedings{4b96bd9b3e6b4c56966592bb58487deb,
title = "VSCF: A vote-based secure cluster formation scheme",
abstract = "In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.",
author = "WenCheng Yang and YiYing Zhang and KeeBum Kim and DongSub Kim and MinYu Cui and Ming Xue and Park, {Myong Soon}",
year = "2008",
month = "8",
day = "18",
doi = "10.1109/ICNSC.2008.4525394",
language = "English",
isbn = "9781424416851",
pages = "1174--1178",
booktitle = "Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC",

}

TY - GEN

T1 - VSCF

T2 - A vote-based secure cluster formation scheme

AU - Yang, WenCheng

AU - Zhang, YiYing

AU - Kim, KeeBum

AU - Kim, DongSub

AU - Cui, MinYu

AU - Xue, Ming

AU - Park, Myong Soon

PY - 2008/8/18

Y1 - 2008/8/18

N2 - In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.

AB - In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.

UR - http://www.scopus.com/inward/record.url?scp=49249095016&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=49249095016&partnerID=8YFLogxK

U2 - 10.1109/ICNSC.2008.4525394

DO - 10.1109/ICNSC.2008.4525394

M3 - Conference contribution

SN - 9781424416851

SP - 1174

EP - 1178

BT - Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC

ER -