DocumentCode :
2357423
Title :
Enhancing S-LEACH security for wireless sensor networks
Author :
El ; Shaaban, Eman
Author_Institution :
Comput. Syst. Dept., Ain Shams Univ., Cairo, Egypt
fYear :
2012
fDate :
6-8 May 2012
Firstpage :
1
Lastpage :
6
Abstract :
Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limited resources of WSNs and the hazardous nature of wireless medium. The implementation of encryption/decryption algorithms which are the most essential part of the secure communication can be very intricate in WSNs since they incorporate routines that having very complex and intense computing procedures. A secure clustering protocol that achieves the desired security goals while keeping an acceptable level of energy consumption is a challenging problem in wireless sensor network. LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol for WSNs. S-LEACH is the first modified version of LEACH with cryptographic protection against outsider attacks. This paper proposes MS-LEACH to enhance the security of S-LEACH by providing data confidentiality and node to cluster head (CH) authentication using pairwise keys shared between CHs and their cluster members. The security analysis of proposed MS-LEACH shows that it has efficient security properties and achieves all WSN security goals compared to the existing secured solutions of LEACH protocol. A simulation based performance evaluation of MS-LEACH demonstrates the effectiveness of proposed MS-LEACH protocol and shows that the protocol achieves the desired security goals and outperforms other protocols in terms of energy consumption, network lifetime, network throughput and normalized routing load.
Keywords :
cryptographic protocols; data privacy; energy consumption; pattern clustering; routing protocols; telecommunication network management; telecommunication security; wireless sensor networks; CH authentication; MS-LEACH protocol; S-LEACH security; WSN; cluster head authentication; clustering-based routing protocol; communication security; cryptographic protection; data confidentiality; decryption algorithm; encryption algorithm; energy consumption; low energy adaptive clustering hierarchy; network lifetime; network throughput; outsider attack; pairwise keys; wireless sensor network; Authentication; Cryptography; Energy consumption; Protocols; Throughput; Wireless sensor networks; Blowfish; Clustering; Encryption; RC5; Security; Wireless sensor network (WSN);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electro/Information Technology (EIT), 2012 IEEE International Conference on
Conference_Location :
Indianapolis, IN
ISSN :
2154-0357
Print_ISBN :
978-1-4673-0819-9
Type :
conf
DOI :
10.1109/EIT.2012.6220698
Filename :
6220698
Link To Document :
بازگشت