Skip to main content

Secure Cluster Header Election Techniques in Sensor Network

  • Conference paper
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops (ISPA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4743))

Abstract

Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network.

In this paper, first each node transmit residual electric power and authentication message to BS(Base-Station). BS reflects “Validity Authentication Rate” and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates “Validity Authentication Rate” of former round. Finally, BS can select more secure cluster header.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine (2002)

    Google Scholar 

  2. Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Proceedings of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks, ACM Press, New York (2003)

    Google Scholar 

  3. Heinzelman, W., Chandrakasan, A., Balakrishana, H.: Energy Efficient Communication Protocol for Wireless Microsensor Networks. In: Proceedings of the 33rd Annual Hawaii International Conference on system Sciences (2000)

    Google Scholar 

  4. Dasgupta, K., Kalpakis, K., Namjoshi, P.: An Effcient Clustering-based Heuristic for Data Gathering and Aggregation in Sensor Networks. In: Wireless Communication and Networking (2003)

    Google Scholar 

  5. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage AK, May 11, 2003, IEEE, Los Alamitos (2003)

    Google Scholar 

  6. Diffie, W., Hellman, M.E.: New directions in cryptography. In: IEEE Transactions on Information Theory, IEEE Computer Society Press, Los Alamitos (1976)

    Google Scholar 

  7. Jang, K.-W., Jung, W.-s., Shin, D.-k., Jun, M.-S.: Design of Secure Clustering Routing Protocol using SNEP and μTESLA on Sensor Network Communication. IJCSNS International Journal of Computer Science and Network Security  (2006)

    Google Scholar 

  8. Ren, K., Lou, W., Moran, P.J.: A proactive data security framework for mission-critical sensor networks. In: IEEE Military Communication Conference (MILCOM 2006), Washington, DC (2006)

    Google Scholar 

  9. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (2003)

    Google Scholar 

  10. Neuman, B.C., Tso, T.: Kerberos: An authentication service for computer networks. IEEE Communications (1994)

    Google Scholar 

  11. Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networkin (MobiCom), IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  12. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. In: Communications of the ACM, ACM Press, New York (1978)

    Google Scholar 

  13. RC5 Cracking Project (1997), http://www.distributed.net/rc5/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Parimala Thulasiraman Xubin He Tony Li Xu Mieso K. Denko Ruppa K. Thulasiram Laurence T. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, P., Kim, J., Han, I., Ryou, H., Ahn, W.H. (2007). Secure Cluster Header Election Techniques in Sensor Network. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74767-3_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74766-6

  • Online ISBN: 978-3-540-74767-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics