@inproceedings{5716f17558cf46498350e35d3fa8d95f,
title = "An authentication protocol for hierarchy-based wireless sensor networks",
abstract = "Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.",
author = "Kim, {Kee Bum} and Zhang, {Yi Ying} and Yang, {Wen Cheng} and Park, {Myong Soon}",
year = "2008",
doi = "10.1109/ISCIS.2008.4717946",
language = "English",
isbn = "9781424428816",
series = "2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008",
booktitle = "2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008",
note = "2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 ; Conference date: 27-10-2008 Through 29-10-2008",
}