Abstract
Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network.
In this paper, first each node transmit residual electric power and authentication message to BS(Base-Station). BS reflects “Validity Authentication Rate” and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates “Validity Authentication Rate” of former round. Finally, BS can select more secure cluster header.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine (2002)
Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Proceedings of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks, ACM Press, New York (2003)
Heinzelman, W., Chandrakasan, A., Balakrishana, H.: Energy Efficient Communication Protocol for Wireless Microsensor Networks. In: Proceedings of the 33rd Annual Hawaii International Conference on system Sciences (2000)
Dasgupta, K., Kalpakis, K., Namjoshi, P.: An Effcient Clustering-based Heuristic for Data Gathering and Aggregation in Sensor Networks. In: Wireless Communication and Networking (2003)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage AK, May 11, 2003, IEEE, Los Alamitos (2003)
Diffie, W., Hellman, M.E.: New directions in cryptography. In: IEEE Transactions on Information Theory, IEEE Computer Society Press, Los Alamitos (1976)
Jang, K.-W., Jung, W.-s., Shin, D.-k., Jun, M.-S.: Design of Secure Clustering Routing Protocol using SNEP and μTESLA on Sensor Network Communication. IJCSNS International Journal of Computer Science and Network Security (2006)
Ren, K., Lou, W., Moran, P.J.: A proactive data security framework for mission-critical sensor networks. In: IEEE Military Communication Conference (MILCOM 2006), Washington, DC (2006)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (2003)
Neuman, B.C., Tso, T.: Kerberos: An authentication service for computer networks. IEEE Communications (1994)
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networkin (MobiCom), IEEE Computer Society Press, Los Alamitos (2001)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. In: Communications of the ACM, ACM Press, New York (1978)
RC5 Cracking Project (1997), http://www.distributed.net/rc5/
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, P., Kim, J., Han, I., Ryou, H., Ahn, W.H. (2007). Secure Cluster Header Election Techniques in Sensor Network. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-74767-3_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74766-6
Online ISBN: 978-3-540-74767-3
eBook Packages: Computer ScienceComputer Science (R0)