DocumentCode
1907154
Title
An authentication protocol for hierarchy-based wireless sensor networks
Author
Kim, KeeBum ; Zhang, Yiying ; Yang, WenCheng ; Park, Myongsoon
Author_Institution
Korea Univ., Seoul
fYear
2008
fDate
27-29 Oct. 2008
Firstpage
1
Lastpage
6
Abstract
Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (low-energy adaptive clustering hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header centrality topology, adopting security in LEACH is a complicated task. In this paper, we present an authentication protocol for hierarchy-based WSNs to protect network from inside attackers. This protocol uses pre-distribution unique symmetric key with authentication management database (AMDB) and live message to monitor the network to detect the entrance of compromise node using illegal keys.
Keywords
cryptographic protocols; telecommunication security; wireless sensor networks; authentication management database; authentication protocol; energy consumption; hierarchy-based wireless sensor network; live message; network security; predistribution unique symmetric key; system delay; Authentication; Data security; Databases; Delay systems; Energy consumption; Monitoring; Network topology; Protection; Wireless application protocol; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on
Conference_Location
Istanbul
Print_ISBN
978-1-4244-2880-9
Electronic_ISBN
978-1-4244-2881-6
Type
conf
DOI
10.1109/ISCIS.2008.4717946
Filename
4717946
Link To Document