Title :
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks
Author :
Zhenghong, Xiao ; Zhigang, Chen
Author_Institution :
Sch. of Inf. Sci. & Eng., Central South Univ. (CSU), Changsha, China
Abstract :
The exactness of sensed data transmission is essential for wireless sensor networks(WSN) applications. Based on clustering WSN architecture, a secure routing protocol with intrusion detection is hereby proposed, wherein an energy prediction model for nodes is used to detect attacks in cluster head election phase, and the key management technique is applied to stage of cluster formation to ensure security of nodes, and a flow prediction model for nodes is used to prevent attacks related with traffic in routing phase. This study aims to improve security of WSN routing protocol. Using NS2 tool, the simulation environment is given. Simulation results show that the proposed protocol can detect and defend against several sophisticated routing attacks such as Sybil, Wormhole, Selective Forwarding and Hello flood attacks.
Keywords :
routing protocols; telecommunication security; wireless sensor networks; NS2 tool; Sybil attacks; cluster head election phase; clustering wireless sensor networks; energy prediction model; hello flood attacks; intrusion detection; key management technique; secure routing protocol; selective forwarding attacks; sensed data transmission exactness; wormhole attacks; Energy consumption; Predictive models; Routing; Routing protocols; Security; Wireless sensor networks; WSN; energy prediction; flow prediction; intrusion detection; key management; routing security;
Conference_Titel :
Information Technology and Applications (IFITA), 2010 International Forum on
Conference_Location :
Kunming
Print_ISBN :
978-1-4244-7621-3
Electronic_ISBN :
978-1-4244-7622-0
DOI :
10.1109/IFITA.2010.129