A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Hi-index | 0.00 |
Clustering in wireless sensor networks WSN is a technique used to improve the lifetime of the network. Heinzelman et al. proposed a clustering method called LEACH which rotates the role of CH among the nodes in the network. However, it does not provide any security. In this paper, we propose two deterministic key establishment protocols to counter the vulnerabilities of LEACH protocol. These protocols are called polynomial-based key establishment protocol PBKEP and hash-based key establishment protocol HBKEP. These protocols ensure that it is always possible to establish a secret key with the current CH in every round of LEACH clustering protocol. The protocols also ensure that a malicious node cannot join the cluster at any round. The clusters are formed only among the legitimate nodes. Also any malicious node pretending as CH will not succeed as no other legitimate node will choose that as CH.