The new intrusion prevention and detection approaches for clustering-based sensor networks

Chien Chung Su, Ko Ming Chang, Yau-Hwang Kuo, Mong Fong Horng

Research output: Contribution to journalConference article

71 Citations (Scopus)

Abstract

In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.

Original languageEnglish
Pages (from-to)1927-1932
Number of pages6
JournalIEEE Wireless Communications and Networking Conference, WCNC
Volume4
Publication statusPublished - 2005 Sep 26
Event2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off - New Orleans, LA, United States
Duration: 2005 Mar 132005 Mar 17

Fingerprint

Sensor networks
Authentication
Monitoring
Intrusion detection
Energy conservation

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

@article{bfaa57ca42b548efb822b656fd2917b4,
title = "The new intrusion prevention and detection approaches for clustering-based sensor networks",
abstract = "In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.",
author = "Su, {Chien Chung} and Chang, {Ko Ming} and Yau-Hwang Kuo and Horng, {Mong Fong}",
year = "2005",
month = "9",
day = "26",
language = "English",
volume = "4",
pages = "1927--1932",
journal = "IEEE Wireless Communications and Networking Conference, WCNC",
issn = "1525-3511",

}

The new intrusion prevention and detection approaches for clustering-based sensor networks. / Su, Chien Chung; Chang, Ko Ming; Kuo, Yau-Hwang; Horng, Mong Fong.

In: IEEE Wireless Communications and Networking Conference, WCNC, Vol. 4, 26.09.2005, p. 1927-1932.

Research output: Contribution to journalConference article

TY - JOUR

T1 - The new intrusion prevention and detection approaches for clustering-based sensor networks

AU - Su, Chien Chung

AU - Chang, Ko Ming

AU - Kuo, Yau-Hwang

AU - Horng, Mong Fong

PY - 2005/9/26

Y1 - 2005/9/26

N2 - In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.

AB - In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.

UR - http://www.scopus.com/inward/record.url?scp=24944560667&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944560667&partnerID=8YFLogxK

M3 - Conference article

AN - SCOPUS:24944560667

VL - 4

SP - 1927

EP - 1932

JO - IEEE Wireless Communications and Networking Conference, WCNC

JF - IEEE Wireless Communications and Networking Conference, WCNC

SN - 1525-3511

ER -