Loading…
VSCF: A Vote-based Secure Cluster Formation Scheme
In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (C...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 1178 |
container_issue | |
container_start_page | 1174 |
container_title | |
container_volume | |
creator | Yang, W.C. Zhang, Y.Y. Kim, K.B. Kim, D.S. Cui, M.Y. Xue, M. Park, M.-S. |
description | In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster. |
doi_str_mv | 10.1109/ICNSC.2008.4525394 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4525394</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4525394</ieee_id><sourcerecordid>4525394</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-4d0c0f6ea73e2913b1d95566d0c279c9faa6e93189d43358dab04d9671856c6a3</originalsourceid><addsrcrecordid>eNo1j01Lw0AYhFekoK35A3rZP5C4X-9-eCuLqYWih2jxVjbZNxhpjGzSg__egHUuwzwMA0PILWcF58zdb_1z5QvBmC0UCJBOXZDMGcuVUIprq-0lWf4HeF-Q5dw1Tmpm4Ipk4_jJZimQAPKaiH3lywe6pvthwrwOI0ZaYXNKSP3xNE6YaDmkPkzd8EWr5gN7vCGLNhxHzM6-Im_l46t_yncvm61f7_KOG5hyFVnDWo3BSBSOy5pHB6D1jIVxjWtD0Ogkty4qKcHGUDMVnTbcgm50kCty97fbIeLhO3V9SD-H82f5C7zRRfg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>VSCF: A Vote-based Secure Cluster Formation Scheme</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yang, W.C. ; Zhang, Y.Y. ; Kim, K.B. ; Kim, D.S. ; Cui, M.Y. ; Xue, M. ; Park, M.-S.</creator><creatorcontrib>Yang, W.C. ; Zhang, Y.Y. ; Kim, K.B. ; Kim, D.S. ; Cui, M.Y. ; Xue, M. ; Park, M.-S.</creatorcontrib><description>In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.</description><identifier>ISBN: 142441685X</identifier><identifier>ISBN: 9781424416851</identifier><identifier>EISBN: 9781424416868</identifier><identifier>EISBN: 1424416868</identifier><identifier>DOI: 10.1109/ICNSC.2008.4525394</identifier><identifier>LCCN: 2007936075</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer architecture ; Computer industry ; Computer science ; Data security ; Gas industry ; Military computing ; Power engineering and energy ; Protocols ; Routing ; Wireless sensor networks</subject><ispartof>2008 IEEE International Conference on Networking, Sensing and Control, 2008, p.1174-1178</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4525394$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>310,311,781,785,790,791,2059,27927,54922</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4525394$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yang, W.C.</creatorcontrib><creatorcontrib>Zhang, Y.Y.</creatorcontrib><creatorcontrib>Kim, K.B.</creatorcontrib><creatorcontrib>Kim, D.S.</creatorcontrib><creatorcontrib>Cui, M.Y.</creatorcontrib><creatorcontrib>Xue, M.</creatorcontrib><creatorcontrib>Park, M.-S.</creatorcontrib><title>VSCF: A Vote-based Secure Cluster Formation Scheme</title><title>2008 IEEE International Conference on Networking, Sensing and Control</title><addtitle>ICNSC</addtitle><description>In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.</description><subject>Computer architecture</subject><subject>Computer industry</subject><subject>Computer science</subject><subject>Data security</subject><subject>Gas industry</subject><subject>Military computing</subject><subject>Power engineering and energy</subject><subject>Protocols</subject><subject>Routing</subject><subject>Wireless sensor networks</subject><isbn>142441685X</isbn><isbn>9781424416851</isbn><isbn>9781424416868</isbn><isbn>1424416868</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j01Lw0AYhFekoK35A3rZP5C4X-9-eCuLqYWih2jxVjbZNxhpjGzSg__egHUuwzwMA0PILWcF58zdb_1z5QvBmC0UCJBOXZDMGcuVUIprq-0lWf4HeF-Q5dw1Tmpm4Ipk4_jJZimQAPKaiH3lywe6pvthwrwOI0ZaYXNKSP3xNE6YaDmkPkzd8EWr5gN7vCGLNhxHzM6-Im_l46t_yncvm61f7_KOG5hyFVnDWo3BSBSOy5pHB6D1jIVxjWtD0Ogkty4qKcHGUDMVnTbcgm50kCty97fbIeLhO3V9SD-H82f5C7zRRfg</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yang, W.C.</creator><creator>Zhang, Y.Y.</creator><creator>Kim, K.B.</creator><creator>Kim, D.S.</creator><creator>Cui, M.Y.</creator><creator>Xue, M.</creator><creator>Park, M.-S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200804</creationdate><title>VSCF: A Vote-based Secure Cluster Formation Scheme</title><author>Yang, W.C. ; Zhang, Y.Y. ; Kim, K.B. ; Kim, D.S. ; Cui, M.Y. ; Xue, M. ; Park, M.-S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-4d0c0f6ea73e2913b1d95566d0c279c9faa6e93189d43358dab04d9671856c6a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Computer architecture</topic><topic>Computer industry</topic><topic>Computer science</topic><topic>Data security</topic><topic>Gas industry</topic><topic>Military computing</topic><topic>Power engineering and energy</topic><topic>Protocols</topic><topic>Routing</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Yang, W.C.</creatorcontrib><creatorcontrib>Zhang, Y.Y.</creatorcontrib><creatorcontrib>Kim, K.B.</creatorcontrib><creatorcontrib>Kim, D.S.</creatorcontrib><creatorcontrib>Cui, M.Y.</creatorcontrib><creatorcontrib>Xue, M.</creatorcontrib><creatorcontrib>Park, M.-S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yang, W.C.</au><au>Zhang, Y.Y.</au><au>Kim, K.B.</au><au>Kim, D.S.</au><au>Cui, M.Y.</au><au>Xue, M.</au><au>Park, M.-S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>VSCF: A Vote-based Secure Cluster Formation Scheme</atitle><btitle>2008 IEEE International Conference on Networking, Sensing and Control</btitle><stitle>ICNSC</stitle><date>2008-04</date><risdate>2008</risdate><spage>1174</spage><epage>1178</epage><pages>1174-1178</pages><isbn>142441685X</isbn><isbn>9781424416851</isbn><eisbn>9781424416868</eisbn><eisbn>1424416868</eisbn><abstract>In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.</abstract><pub>IEEE</pub><doi>10.1109/ICNSC.2008.4525394</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 142441685X |
ispartof | 2008 IEEE International Conference on Networking, Sensing and Control, 2008, p.1174-1178 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4525394 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer architecture Computer industry Computer science Data security Gas industry Military computing Power engineering and energy Protocols Routing Wireless sensor networks |
title | VSCF: A Vote-based Secure Cluster Formation Scheme |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T09%3A26%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=VSCF:%20A%20Vote-based%20Secure%20Cluster%20Formation%20Scheme&rft.btitle=2008%20IEEE%20International%20Conference%20on%20Networking,%20Sensing%20and%20Control&rft.au=Yang,%20W.C.&rft.date=2008-04&rft.spage=1174&rft.epage=1178&rft.pages=1174-1178&rft.isbn=142441685X&rft.isbn_list=9781424416851&rft_id=info:doi/10.1109/ICNSC.2008.4525394&rft.eisbn=9781424416868&rft.eisbn_list=1424416868&rft_dat=%3Cieee_6IE%3E4525394%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-4d0c0f6ea73e2913b1d95566d0c279c9faa6e93189d43358dab04d9671856c6a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4525394&rfr_iscdi=true |