[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks

  • Conference paper
Advances in Data and Web Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4505))

Abstract

Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to severe security problems. In order to solve this problem, a clustered routing protocol with distributed intrusion detection for WSN (WSN_DID) is proposed in this paper. In WSN_DID all nodes are organized to identify intruding cluster heads in a distributed way by pre-distributed random keys. The experiments demonstrate that compared with classic cluster-based routing protocol in WSN, energy dissipation in WSN_DID is rather less and the toleration of intrusion is elevated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Li, J., Li, J.-B., Shi, S.-F.: Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks. Journal of Software 14(10), 1717–1727 (2003)

    MATH  Google Scholar 

  2. Kern, N., Schiele, B., Schmidt, A.: Multi-sensor Activity Context Detection for Wearable Computing. In: Aarts, E., Collier, R.W., van Loenen, E., de Ruyter, B. (eds.) EUSAI 2003. LNCS, vol. 2875, pp. 220–232. Springer, Heidelberg (2003)

    Google Scholar 

  3. Villate, Y., Illarramendi, A., Piroura, E.: Keep Your Data Safe and Available While Roaming. Mobil Networks and Applications 7(4), 315–328 (2002)

    Article  Google Scholar 

  4. Du, W., Deng, J.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM TISS 8(2), 228–258 (2005)

    Article  Google Scholar 

  5. Deshpande, A., Guestrin, C., Madden, S.R., Hellerstein, J.M., Hong, W.: Model-Driven Data Acquisition in Sensor Networks. In: Proceedings of the 30th VLDB Conference, Toronto, Canada, pp. 588–599 (2004)

    Google Scholar 

  6. Cuzzocrea, A., Furfaro, F., Mazzeo, G.M., Saccá, D.: A Grid Framework for Approximate Aggregate Query Answering on Summarized Sensor Network Readings. In: Meersman, R., Tari, Z., Corsaro, A. (eds.) OTM-WS 2004. LNCS, vol. 3292, pp. 144–153. Springer, Heidelberg (2004)

    Google Scholar 

  7. Heinzelman, W.B., Chandrakasan, A.P.: An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. On Wireless Comunication 1(4), 660–670 (2002)

    Article  Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293–315 (2003)

    Google Scholar 

  9. Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)

    Google Scholar 

  10. Perrig, A., Szewczyk, R.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521–534 (2002)

    Article  MATH  Google Scholar 

  11. Oliveira, L.B., Wong, H.C., Bern, M.: SecLEACH–A Random Key Distribution Solution for Securing Clustered Sensor Networks. In: Fifth IEEE International Symposium on Network Computing and Applications (2006)

    Google Scholar 

  12. Pietro, R.D., Mancini, L.V.: Random Key Assignment for Secure Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, ACM Press, New York (2003)

    Google Scholar 

  13. Manjeshwar, A., Grawal, D.P.: TEEN: A protocol for enhanced efficiency in wireless sensor networks. In: Proc. of the 15th Parallel and Distributed Processing Symp., San Francisco, pp. 2009–2015. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  14. Handy, M.J., Haase, M., Timmermann, D.: Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: Proc. of the 4th IEEE Conf. on Mobile and Wireless Communications Networks, Stockholm, pp. 368–372. IEEE Communications Society, Los Alamitos (2002)

    Google Scholar 

  15. Sion, R., Atallah, M., Prabhakar, S.: Resilient Rights Protection for Sensor Streams. In: Proceedings of the 30th VLDB Conference, Toronto, Canada (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Guozhu Dong Xuemin Lin Wei Wang Yun Yang Jeffrey Xu Yu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Yao, L., An, N., Gao, F., Yu, G. (2007). A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds) Advances in Data and Web Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4505. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72524-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72524-4_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72483-4

  • Online ISBN: 978-3-540-72524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics