In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.
|Number of pages||6|
|Journal||IEEE Wireless Communications and Networking Conference, WCNC|
|Publication status||Published - 2005 Sept 26|
|Event||2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off - New Orleans, LA, United States|
Duration: 2005 Mar 13 → 2005 Mar 17
All Science Journal Classification (ASJC) codes