Keep your data safe and available while roaming
Mobile Networks and Applications
SPINS: security protocols for sensor networks
Wireless Networks
TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
Model-driven data acquisition in sensor networks
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Hi-index | 0.00 |
Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to severe security problems. In order to solve this problem, a clustered routing protocol with distributed intrusion detection for WSN (WSN_DID) is proposed in this paper. In WSN_DID all nodes are organized to identify intruding cluster heads in a distributed way by predistributed random keys. The experiments demonstrate that compared with classic cluster-based routing protocol in WSN, energy dissipation in WSN_DID is rather less and the toleration of intrusion is elevated.