DocumentCode
3076145
Title
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks
Author
Zhenghong, Xiao ; Zhigang, Chen
Author_Institution
Sch. of Inf. Sci. & Eng., Central South Univ. (CSU), Changsha, China
Volume
1
fYear
2010
fDate
16-18 July 2010
Firstpage
230
Lastpage
233
Abstract
The exactness of sensed data transmission is essential for wireless sensor networks(WSN) applications. Based on clustering WSN architecture, a secure routing protocol with intrusion detection is hereby proposed, wherein an energy prediction model for nodes is used to detect attacks in cluster head election phase, and the key management technique is applied to stage of cluster formation to ensure security of nodes, and a flow prediction model for nodes is used to prevent attacks related with traffic in routing phase. This study aims to improve security of WSN routing protocol. Using NS2 tool, the simulation environment is given. Simulation results show that the proposed protocol can detect and defend against several sophisticated routing attacks such as Sybil, Wormhole, Selective Forwarding and Hello flood attacks.
Keywords
routing protocols; telecommunication security; wireless sensor networks; NS2 tool; Sybil attacks; cluster head election phase; clustering wireless sensor networks; energy prediction model; hello flood attacks; intrusion detection; key management technique; secure routing protocol; selective forwarding attacks; sensed data transmission exactness; wormhole attacks; Energy consumption; Predictive models; Routing; Routing protocols; Security; Wireless sensor networks; WSN; energy prediction; flow prediction; intrusion detection; key management; routing security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology and Applications (IFITA), 2010 International Forum on
Conference_Location
Kunming
Print_ISBN
978-1-4244-7621-3
Electronic_ISBN
978-1-4244-7622-0
Type
conf
DOI
10.1109/IFITA.2010.129
Filename
5635108
Link To Document