VSCF: A vote-based secure cluster formation scheme

Wen Cheng Yang, Yi Ying Zhang, Kee Bum Kim, Dong Sub Kim, Min Yu Cui, Ming Xue, Myong Soon Park

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.

    Original languageEnglish
    Title of host publicationProceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
    Pages1174-1178
    Number of pages5
    DOIs
    Publication statusPublished - 2008
    Event2008 IEEE International Conference on Networking, Sensing and Control, ICNSC - Sanya, China
    Duration: 2008 Apr 62008 Apr 8

    Publication series

    NameProceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC

    Other

    Other2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
    Country/TerritoryChina
    CitySanya
    Period08/4/608/4/8

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Control and Systems Engineering

    Fingerprint

    Dive into the research topics of 'VSCF: A vote-based secure cluster formation scheme'. Together they form a unique fingerprint.

    Cite this