Advertisement

A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks

  • Lan Yao
  • Na An
  • Fuxiang Gao
  • Ge Yu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4505)

Abstract

Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to severe security problems. In order to solve this problem, a clustered routing protocol with distributed intrusion detection for WSN (WSN_DID) is proposed in this paper. In WSN_DID all nodes are organized to identify intruding cluster heads in a distributed way by pre-distributed random keys. The experiments demonstrate that compared with classic cluster-based routing protocol in WSN, energy dissipation in WSN_DID is rather less and the toleration of intrusion is elevated.

Keywords

Wireless Sensor Network Cluster Head Message Authentication Code Ordinary Node Selective Forwarding Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, J., Li, J.-B., Shi, S.-F.: Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks. Journal of Software 14(10), 1717–1727 (2003)zbMATHGoogle Scholar
  2. 2.
    Kern, N., Schiele, B., Schmidt, A.: Multi-sensor Activity Context Detection for Wearable Computing. In: Aarts, E., Collier, R.W., van Loenen, E., de Ruyter, B. (eds.) EUSAI 2003. LNCS, vol. 2875, pp. 220–232. Springer, Heidelberg (2003)Google Scholar
  3. 3.
    Villate, Y., Illarramendi, A., Piroura, E.: Keep Your Data Safe and Available While Roaming. Mobil Networks and Applications 7(4), 315–328 (2002)CrossRefGoogle Scholar
  4. 4.
    Du, W., Deng, J.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM TISS 8(2), 228–258 (2005)CrossRefGoogle Scholar
  5. 5.
    Deshpande, A., Guestrin, C., Madden, S.R., Hellerstein, J.M., Hong, W.: Model-Driven Data Acquisition in Sensor Networks. In: Proceedings of the 30th VLDB Conference, Toronto, Canada, pp. 588–599 (2004)Google Scholar
  6. 6.
    Cuzzocrea, A., Furfaro, F., Mazzeo, G.M., Saccá, D.: A Grid Framework for Approximate Aggregate Query Answering on Summarized Sensor Network Readings. In: Meersman, R., Tari, Z., Corsaro, A. (eds.) OTM-WS 2004. LNCS, vol. 3292, pp. 144–153. Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Heinzelman, W.B., Chandrakasan, A.P.: An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. On Wireless Comunication 1(4), 660–670 (2002)CrossRefGoogle Scholar
  8. 8.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293–315 (2003)Google Scholar
  9. 9.
    Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)Google Scholar
  10. 10.
    Perrig, A., Szewczyk, R.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521–534 (2002)zbMATHCrossRefGoogle Scholar
  11. 11.
    Oliveira, L.B., Wong, H.C., Bern, M.: SecLEACH–A Random Key Distribution Solution for Securing Clustered Sensor Networks. In: Fifth IEEE International Symposium on Network Computing and Applications (2006)Google Scholar
  12. 12.
    Pietro, R.D., Mancini, L.V.: Random Key Assignment for Secure Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, ACM Press, New York (2003)Google Scholar
  13. 13.
    Manjeshwar, A., Grawal, D.P.: TEEN: A protocol for enhanced efficiency in wireless sensor networks. In: Proc. of the 15th Parallel and Distributed Processing Symp., San Francisco, pp. 2009–2015. IEEE Computer Society Press, Los Alamitos (2001)Google Scholar
  14. 14.
    Handy, M.J., Haase, M., Timmermann, D.: Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: Proc. of the 4th IEEE Conf. on Mobile and Wireless Communications Networks, Stockholm, pp. 368–372. IEEE Communications Society, Los Alamitos (2002)Google Scholar
  15. 15.
    Sion, R., Atallah, M., Prabhakar, S.: Resilient Rights Protection for Sensor Streams. In: Proceedings of the 30th VLDB Conference, Toronto, Canada (2004)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Lan Yao
    • 1
  • Na An
    • 1
  • Fuxiang Gao
    • 1
  • Ge Yu
    • 1
  1. 1.Northeastern University, Shenyang 110004P.R. China

Personalised recommendations