• DocumentCode
    1907154
  • Title

    An authentication protocol for hierarchy-based wireless sensor networks

  • Author

    Kim, KeeBum ; Zhang, Yiying ; Yang, WenCheng ; Park, Myongsoon

  • Author_Institution
    Korea Univ., Seoul
  • fYear
    2008
  • fDate
    27-29 Oct. 2008
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (low-energy adaptive clustering hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with authentication management database (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.
  • Keywords
    cryptographic protocols; telecommunication security; wireless sensor networks; authentication management database; authentication protocol; energy consumption; hierarchy-based wireless sensor network; live message; network security; predistribution unique symmetric key; system delay; Authentication; Data security; Databases; Delay systems; Energy consumption; Monitoring; Network topology; Protection; Wireless application protocol; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on
  • Conference_Location
    Istanbul
  • Print_ISBN
    978-1-4244-2880-9
  • Electronic_ISBN
    978-1-4244-2881-6
  • Type

    conf

  • DOI
    10.1109/ISCIS.2008.4717946
  • Filename
    4717946