The new intrusion prevention and detection approaches for clustering-based sensor networks

Chien Chung Su, Ko Ming Chang, Yau-Hwang Kuo, Mong Fong Horng

Research output: Contribution to journalConference articlepeer-review

75 Citations (Scopus)

Abstract

In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.

Original languageEnglish
Pages (from-to)1927-1932
Number of pages6
JournalIEEE Wireless Communications and Networking Conference, WCNC
Volume4
Publication statusPublished - 2005 Sep 26
Event2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off - New Orleans, LA, United States
Duration: 2005 Mar 132005 Mar 17

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'The new intrusion prevention and detection approaches for clustering-based sensor networks'. Together they form a unique fingerprint.

Cite this