TY - JOUR
T1 - The new intrusion prevention and detection approaches for clustering-based sensor networks
AU - Su, Chien Chung
AU - Chang, Ko Ming
AU - Kuo, Yau-Hwang
AU - Horng, Mong Fong
PY - 2005/9/26
Y1 - 2005/9/26
N2 - In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.
AB - In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads and member nodes according to the importance of them. When monitoring cluster-heads, member nodes of a cluster-head take turns to monitor this cluster-head. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, cluster-heads have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using cluster-heads to monitor member nodes instead of using all the member nodes to monitor each other. Finally, the simulations are performed and compared with LEACH based on ns2 LEACH cad tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attacks.
UR - http://www.scopus.com/inward/record.url?scp=24944560667&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=24944560667&partnerID=8YFLogxK
M3 - Conference article
AN - SCOPUS:24944560667
SN - 1525-3511
VL - 4
SP - 1927
EP - 1932
JO - IEEE Wireless Communications and Networking Conference, WCNC
JF - IEEE Wireless Communications and Networking Conference, WCNC
T2 - 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off
Y2 - 13 March 2005 through 17 March 2005
ER -