2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2010
DOI: 10.1109/euc.2010.70
|View full text |Cite
|
Sign up to set email alerts
|

A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks

Abstract: The main goal of Cluster-based sensor networks is to decrease system delay and reduce energy consumption. LEACH is a cluster-based protocol for microsensor networks which achieves energy-efficient, scalable routing and fair media access for sensor nodes. However, the election of a malicious or compromised sensor node as the cluster head is one the most significant breaches in cluster-based wireless sensor networks. We propose a deterministic key management scheme, called DKS-LEACH, to secure LEACH protocol aga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 15 publications
(21 reference statements)
0
14
0
Order By: Relevance
“…In our research work we have gone through schemes [1], [3], [5], [10], [11] and [12]. In [3], they have proposed a scheme secure LEACH (SecLEACH), a probabilistic key management scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In our research work we have gone through schemes [1], [3], [5], [10], [11] and [12]. In [3], they have proposed a scheme secure LEACH (SecLEACH), a probabilistic key management scheme.…”
Section: Related Workmentioning
confidence: 99%
“…The LEACH protocol uses cluster formation technique and reduces the overhead but still it is vulnerable to attacks. So in [5], they have proposed deterministic key management scheme (DKS-LEACH) which secures the LEACH protocol and also prevent election of malicious node as a cluster head (CH). Which prevent some of the attacks like sinkhole, selective forwarding and also provides scalability, authentication and 100% connectivity between nodes without increasing memory consumption.…”
Section: Introductionmentioning
confidence: 99%
“…Bagaa et al (2012) proposed SEDAN which involves a secure and energy-efficient data aggregation technique with false data detection. Ba et al (2010) proposed DKS-LEACH for secure and energy-efficient cluster-based WSNs. Various attacks are avoided by a secure communication between SNs and CHs as well as CHs and BS.…”
Section: Related Workmentioning
confidence: 99%
“…The network architecture consists of 500 nodes in a simulated area of 10003 * 1000 m. The nodal velocity is varied from 5 to 30 m/s. The enhanced DAO-LEACH protocol is analyzed with existing methods like SCAR (Hong et al, 2013), DyDAP (Sicari et al, 2012), DAA (Ozdemir and Cam, 2010), IPHCDA protocol (Ozdemir and Xiao, 2011), SEDAN (Bagaa et al, 2012), DKS-LEACH (Ba et al, 2010) and ESPA (Dieu et al, 2012) in terms of the following parameters.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Ba et al, [10] have proposed a deterministic key management scheme, DKS-LEACH, to secure LEACH protocol against malicious attacks. Dynamic cryptographic keys are established in an autonomous manner to secure the communications between simple nodes and cluster head as well as the communication between cluster heads and base station.…”
Section: Our Schemementioning
confidence: 99%