TY - GEN
T1 - VSCF
T2 - 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
AU - Yang, Wen Cheng
AU - Zhang, Yi Ying
AU - Kim, Kee Bum
AU - Kim, Dong Sub
AU - Cui, Min Yu
AU - Xue, Ming
AU - Park, Myong Soon
PY - 2008
Y1 - 2008
N2 - In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.
AB - In some industrial areas, Wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.
UR - http://www.scopus.com/inward/record.url?scp=49249095016&partnerID=8YFLogxK
U2 - 10.1109/ICNSC.2008.4525394
DO - 10.1109/ICNSC.2008.4525394
M3 - Conference contribution
AN - SCOPUS:49249095016
SN - 9781424416851
T3 - Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
SP - 1174
EP - 1178
BT - Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC
Y2 - 6 April 2008 through 8 April 2008
ER -