Loading…

VSCF: A Vote-based Secure Cluster Formation Scheme

In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (C...

Full description

Saved in:
Bibliographic Details
Main Authors: Yang, W.C., Zhang, Y.Y., Kim, K.B., Kim, D.S., Cui, M.Y., Xue, M., Park, M.-S.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1178
container_issue
container_start_page 1174
container_title
container_volume
creator Yang, W.C.
Zhang, Y.Y.
Kim, K.B.
Kim, D.S.
Cui, M.Y.
Xue, M.
Park, M.-S.
description In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.
doi_str_mv 10.1109/ICNSC.2008.4525394
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4525394</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4525394</ieee_id><sourcerecordid>4525394</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-4d0c0f6ea73e2913b1d95566d0c279c9faa6e93189d43358dab04d9671856c6a3</originalsourceid><addsrcrecordid>eNo1j01Lw0AYhFekoK35A3rZP5C4X-9-eCuLqYWih2jxVjbZNxhpjGzSg__egHUuwzwMA0PILWcF58zdb_1z5QvBmC0UCJBOXZDMGcuVUIprq-0lWf4HeF-Q5dw1Tmpm4Ipk4_jJZimQAPKaiH3lywe6pvthwrwOI0ZaYXNKSP3xNE6YaDmkPkzd8EWr5gN7vCGLNhxHzM6-Im_l46t_yncvm61f7_KOG5hyFVnDWo3BSBSOy5pHB6D1jIVxjWtD0Ogkty4qKcHGUDMVnTbcgm50kCty97fbIeLhO3V9SD-H82f5C7zRRfg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>VSCF: A Vote-based Secure Cluster Formation Scheme</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yang, W.C. ; Zhang, Y.Y. ; Kim, K.B. ; Kim, D.S. ; Cui, M.Y. ; Xue, M. ; Park, M.-S.</creator><creatorcontrib>Yang, W.C. ; Zhang, Y.Y. ; Kim, K.B. ; Kim, D.S. ; Cui, M.Y. ; Xue, M. ; Park, M.-S.</creatorcontrib><description>In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.</description><identifier>ISBN: 142441685X</identifier><identifier>ISBN: 9781424416851</identifier><identifier>EISBN: 9781424416868</identifier><identifier>EISBN: 1424416868</identifier><identifier>DOI: 10.1109/ICNSC.2008.4525394</identifier><identifier>LCCN: 2007936075</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer architecture ; Computer industry ; Computer science ; Data security ; Gas industry ; Military computing ; Power engineering and energy ; Protocols ; Routing ; Wireless sensor networks</subject><ispartof>2008 IEEE International Conference on Networking, Sensing and Control, 2008, p.1174-1178</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4525394$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>310,311,781,785,790,791,2059,27927,54922</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4525394$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yang, W.C.</creatorcontrib><creatorcontrib>Zhang, Y.Y.</creatorcontrib><creatorcontrib>Kim, K.B.</creatorcontrib><creatorcontrib>Kim, D.S.</creatorcontrib><creatorcontrib>Cui, M.Y.</creatorcontrib><creatorcontrib>Xue, M.</creatorcontrib><creatorcontrib>Park, M.-S.</creatorcontrib><title>VSCF: A Vote-based Secure Cluster Formation Scheme</title><title>2008 IEEE International Conference on Networking, Sensing and Control</title><addtitle>ICNSC</addtitle><description>In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.</description><subject>Computer architecture</subject><subject>Computer industry</subject><subject>Computer science</subject><subject>Data security</subject><subject>Gas industry</subject><subject>Military computing</subject><subject>Power engineering and energy</subject><subject>Protocols</subject><subject>Routing</subject><subject>Wireless sensor networks</subject><isbn>142441685X</isbn><isbn>9781424416851</isbn><isbn>9781424416868</isbn><isbn>1424416868</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j01Lw0AYhFekoK35A3rZP5C4X-9-eCuLqYWih2jxVjbZNxhpjGzSg__egHUuwzwMA0PILWcF58zdb_1z5QvBmC0UCJBOXZDMGcuVUIprq-0lWf4HeF-Q5dw1Tmpm4Ipk4_jJZimQAPKaiH3lywe6pvthwrwOI0ZaYXNKSP3xNE6YaDmkPkzd8EWr5gN7vCGLNhxHzM6-Im_l46t_yncvm61f7_KOG5hyFVnDWo3BSBSOy5pHB6D1jIVxjWtD0Ogkty4qKcHGUDMVnTbcgm50kCty97fbIeLhO3V9SD-H82f5C7zRRfg</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yang, W.C.</creator><creator>Zhang, Y.Y.</creator><creator>Kim, K.B.</creator><creator>Kim, D.S.</creator><creator>Cui, M.Y.</creator><creator>Xue, M.</creator><creator>Park, M.-S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200804</creationdate><title>VSCF: A Vote-based Secure Cluster Formation Scheme</title><author>Yang, W.C. ; Zhang, Y.Y. ; Kim, K.B. ; Kim, D.S. ; Cui, M.Y. ; Xue, M. ; Park, M.-S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-4d0c0f6ea73e2913b1d95566d0c279c9faa6e93189d43358dab04d9671856c6a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Computer architecture</topic><topic>Computer industry</topic><topic>Computer science</topic><topic>Data security</topic><topic>Gas industry</topic><topic>Military computing</topic><topic>Power engineering and energy</topic><topic>Protocols</topic><topic>Routing</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Yang, W.C.</creatorcontrib><creatorcontrib>Zhang, Y.Y.</creatorcontrib><creatorcontrib>Kim, K.B.</creatorcontrib><creatorcontrib>Kim, D.S.</creatorcontrib><creatorcontrib>Cui, M.Y.</creatorcontrib><creatorcontrib>Xue, M.</creatorcontrib><creatorcontrib>Park, M.-S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yang, W.C.</au><au>Zhang, Y.Y.</au><au>Kim, K.B.</au><au>Kim, D.S.</au><au>Cui, M.Y.</au><au>Xue, M.</au><au>Park, M.-S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>VSCF: A Vote-based Secure Cluster Formation Scheme</atitle><btitle>2008 IEEE International Conference on Networking, Sensing and Control</btitle><stitle>ICNSC</stitle><date>2008-04</date><risdate>2008</risdate><spage>1174</spage><epage>1178</epage><pages>1174-1178</pages><isbn>142441685X</isbn><isbn>9781424416851</isbn><eisbn>9781424416868</eisbn><eisbn>1424416868</eisbn><abstract>In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network security, they are not sufficient to solve the problems which the enemy nodes, which own the correct keys of networks, initial some inside attacks. Especially, if they successfully become the CHs, the whole network security will be threatened. In this paper, we propose a vote-based cluster formation scheme to choose the nodes, which own both highest credit and enough power, to be the CH candidates for the next round, thus reduce the probability of malicious nodes becoming the CHs and securely form the cluster.</abstract><pub>IEEE</pub><doi>10.1109/ICNSC.2008.4525394</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 142441685X
ispartof 2008 IEEE International Conference on Networking, Sensing and Control, 2008, p.1174-1178
issn
language eng
recordid cdi_ieee_primary_4525394
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer architecture
Computer industry
Computer science
Data security
Gas industry
Military computing
Power engineering and energy
Protocols
Routing
Wireless sensor networks
title VSCF: A Vote-based Secure Cluster Formation Scheme
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T09%3A26%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=VSCF:%20A%20Vote-based%20Secure%20Cluster%20Formation%20Scheme&rft.btitle=2008%20IEEE%20International%20Conference%20on%20Networking,%20Sensing%20and%20Control&rft.au=Yang,%20W.C.&rft.date=2008-04&rft.spage=1174&rft.epage=1178&rft.pages=1174-1178&rft.isbn=142441685X&rft.isbn_list=9781424416851&rft_id=info:doi/10.1109/ICNSC.2008.4525394&rft.eisbn=9781424416868&rft.eisbn_list=1424416868&rft_dat=%3Cieee_6IE%3E4525394%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-4d0c0f6ea73e2913b1d95566d0c279c9faa6e93189d43358dab04d9671856c6a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4525394&rfr_iscdi=true