DocumentCode
3113751
Title
Security and performance analysis of a secure clustering protocol for sensor networks
Author
Banerjee, Pubali ; Jacobson, Doug ; Lahiri, Soumendra Nath
Author_Institution
Iowa state Univ., Ames
fYear
2007
fDate
12-14 July 2007
Firstpage
145
Lastpage
152
Abstract
Clustering protocols are often used in sensor networks. In many deployment scenarios, security is a key concern. In this paper we provide a secure solution to a commonly used clustering protocol, the LEACH protocol. We show that our protocol, the GS-LEACH protocol is more energy efficient than any of the secure flavors of LEACH. The GS-LEACH (grid-based secure LEACH) protocol uses pre deployment key distribution using prior knowledge of the deployment area. We also provide a detailed security analysis of our protocol and show that it is more secure than the secure versions of LEACH. Finally with the results of our simulation experiments we show that our protocol is very energy efficient and provides a longer network lifetime compared to the other flavors of LEACH.
Keywords
distributed sensors; protocols; telecommunication security; GS-LEACH protocol; grid-based secure LEACH protocol; performance analysis; predeployment key distribution; secure clustering protocol; sensor networks; Authentication; Base stations; Clustering algorithms; Computer networks; Data security; Energy efficiency; Performance analysis; Protocols; Public key; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Network Computing and Applications, 2007. NCA 2007. Sixth IEEE International Symposium on
Conference_Location
Cambridge, MA
Print_ISBN
0-7695-2922-4
Type
conf
DOI
10.1109/NCA.2007.40
Filename
4276616
Link To Document