VSCF: A vote-based secure cluster formation scheme

Wen Cheng Yang, Yi Ying Zhang, Kee Bum Kim, Dong Sub Kim, Min Yu Cui, Ming Xue, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.

Original languageEnglish
Title of host publicationProceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
Pages1174-1178
Number of pages5
DOIs
Publication statusPublished - 2008
Event2008 IEEE International Conference on Networking, Sensing and Control, ICNSC - Sanya, China
Duration: 2008 Apr 62008 Apr 8

Publication series

NameProceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC

Other

Other2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
CountryChina
CitySanya
Period08/4/608/4/8

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'VSCF: A vote-based secure cluster formation scheme'. Together they form a unique fingerprint.

Cite this