An authentication protocol for hierarchy-based wireless sensor networks

Kee Bum Kim, Yi Ying Zhang, Wen Cheng Yang, Myong Soon Park

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (Low-Energy Adaptive Clustering Hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with Authentication Management DataBase (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.

    Original languageEnglish
    Title of host publication2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
    DOIs
    Publication statusPublished - 2008
    Event2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008 - Istanbul, Turkey
    Duration: 2008 Oct 272008 Oct 29

    Publication series

    Name2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008

    Other

    Other2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008
    Country/TerritoryTurkey
    CityIstanbul
    Period08/10/2708/10/29

    ASJC Scopus subject areas

    • Computer Science Applications
    • Information Systems

    Fingerprint

    Dive into the research topics of 'An authentication protocol for hierarchy-based wireless sensor networks'. Together they form a unique fingerprint.

    Cite this