A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks

Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to severe security problems. In order to solve this problem, a clustered routing protocol with distributed intrusion detection for WSN (WSN_DID) is proposed in this paper. In WSN_DID all nodes are organized to identify intruding cluster heads in a distributed way by predistributed random keys. The experiments demonstrate that compared with classic cluster-based routing protocol in WSN, energy dissipation in WSN_DID is rather less and the toleration of intrusion is elevated.

[1]  Li Jian-Zhong,et al.  Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks , 2003 .

[2]  Alfredo Cuzzocrea,et al.  A Grid Framework for Approximate Aggregate Query Answering on Summarized Sensor Network Readings , 2004, OTM Workshops.

[3]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[4]  Albrecht Schmidt,et al.  Multi-sensor Activity Context Detection for Wearable Computing , 2003, EUSAI.

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[7]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[8]  Arantza Illarramendi,et al.  Keep Your Data Safe and Available While Roaming , 2002, Mob. Networks Appl..

[9]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[10]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[11]  Wei Hong,et al.  Model-Driven Data Acquisition in Sensor Networks , 2004, VLDB.

[12]  Dirk Timmermann,et al.  Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[13]  Radu Sion,et al.  Resilient Rights Protection for Sensor Streams , 2004, VLDB.

[14]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[15]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.