메뉴 건너뛰기




Volumn 6, Issue 1, 2014, Pages 70-88

Securing cluster formation and cluster head elections in wireless sensor networks

Author keywords

Secure cluster formation; Secure cluster head election; Secure clustering; Wireless sensor networks

Indexed keywords


EID: 84897556842     PISSN: 20760930     EISSN: 2073607X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (24)
  • 1
  • 2
    • 70449709226 scopus 로고    scopus 로고
    • On the security of cluster-based communication protocols for wireless sensor networks
    • Proc. of 4th IEEE Int'l Conf. on Networking, Reunion Island, France, Apr.
    • A. C. Ferreira, M.A. Vilaca, L. B. Oliveira, E. Habib, H.C. Wong, and A.A. Loureiro, "On the security of cluster-based communication protocols for wireless sensor networks," Proc. of 4th IEEE Int'l Conf. on Networking, Reunion Island, France, Apr. 17-21, 2005
    • (2005) , pp. 17-21
    • Ferreira, A.C.1    Vilaca, M.A.2    Oliveira, L.B.3    Habib, E.4    Wong, H.C.5    Loureiro, A.A.6
  • 3
    • 34247216164 scopus 로고    scopus 로고
    • SecLEACH-a random key distribution solution for securing clustered sensor networks
    • Proc. of 5th IEEE Int'l Symp. On Network Computing and Applications, Cambridge, Massachusetts, USA, Jul. 24-26
    • L. B. Oliveira, H.C. Wong, M. W. Bern, R. Dahab, and A.A. Loureiro, "SecLEACH-a random key distribution solution for securing clustered sensor networks," Proc. of 5th IEEE Int'l Symp. On Network Computing and Applications, Cambridge, Massachusetts, USA, Jul. 24-26, 2006
    • (2006)
    • Oliveira, L.B.1    Wong, H.C.2    Bern, M.W.3    Dahab, R.4    Loureiro, A.A.5
  • 4
    • 77952964313 scopus 로고    scopus 로고
    • DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks
    • Jun.
    • G. Wang, K. Song, and G. Cho, "DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks," IEICE Trans. on Information and Systems, vol. E93-D, no. 6, pp. 1560-1571, Jun. 2010
    • (2010) IEICE Trans. on Information and Systems , vol.E93-D , Issue.6 , pp. 1560-1571
    • Wang, G.1    Song, K.2    Cho, G.3
  • 5
    • 77956600969 scopus 로고    scopus 로고
    • Clustering-based Key Renewals for Clustered Sensor Networks
    • Feb.
    • G. Wang and G. Cho, "Clustering-based Key Renewals for Clustered Sensor Networks," IEICE Trans. on Communications, vol. E92-B, no. 2, pp. 612-615, Feb. 2009
    • (2009) IEICE Trans. on Communications , vol.E92-B , Issue.2 , pp. 612-615
    • Wang, G.1    Cho, G.2
  • 6
    • 84866621505 scopus 로고    scopus 로고
    • Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks
    • Sep.
    • S. Kang and T. Nguyen, "Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks," IEEE Communications Letters, vol. 16, no. 9, pp. 1396-1399, Sep. 2012
    • (2012) IEEE Communications Letters , vol.16 , Issue.9 , pp. 1396-1399
    • Kang, S.1    Nguyen, T.2
  • 7
    • 79957583571 scopus 로고    scopus 로고
    • Improvement in LEACH Protocol for Large-scale Wireless Sensor Networks
    • Proc. of Int'l Conf. on Emerging Trends in Electrical and Computer Technology Mar.
    • V. Katiyar, N. Cand, G. C. Gautam, and A. Kumar, "Improvement in LEACH Protocol for Large-scale Wireless Sensor Networks," Proc. of Int'l Conf. on Emerging Trends in Electrical and Computer Technology, pp. 1070-1075, 2011
    • (2011) , pp. 1070-1075
    • Katiyar, V.1    Cand, N.2    Gautam, G.C.3    Kumar, A.4
  • 8
    • 79952561879 scopus 로고    scopus 로고
    • Unequal Clustering Scheme based LEACH for Wireless Sensor Networks
    • Proc. of Fourth Int'l Conf. on Genetic and Evolutionary Computing,, Dec.
    • P. Ren, J. Qian, L. Li, Z. Zhao, and X. Li, "Unequal Clustering Scheme based LEACH for Wireless Sensor Networks," Proc. of Fourth Int'l Conf. on Genetic and Evolutionary Computing, pp. 90-93, Dec. 2010
    • (2010) , pp. 90-93
    • Ren, P.1    Qian, J.2    Li, L.3    Zhao, Z.4    Li, X.5
  • 9
    • 79953858652 scopus 로고    scopus 로고
    • Improving Threshold Assignment for Cluster Head Selection in Hierarchical Wireless Sensor Networks
    • Proc. of Int'l Symposium on Telecommunications, Dec.
    • M. Saadat, R. Saadat, ang G. Mirjality, "Improving Threshold Assignment for Cluster Head Selection in Hierarchical Wireless Sensor Networks," Proc. of Int'l Symposium on Telecommunications, pp. 409-414, Dec. 2010
    • (2010) , pp. 409-414
    • Saadat, M.1    Saadat, R.2    Mirjality, G.3
  • 11
    • 79751527711 scopus 로고    scopus 로고
    • A Fair and Secure Cluster Formation Process for Ad Hoc Networts
    • H. Rifà-Pous and J. Herrera-Joancomartí, "A Fair and Secure Cluster Formation Process for Ad Hoc Networks," Wireless Communications, vol. 56, no. 3, pp. 625-636, 2011
    • (2011) Wireless Communications , vol.56 , Issue.3 , pp. 625-636
    • Rifà-Pous, H.1    Herrera-Joancomartí, J.2
  • 12
    • 38349181460 scopus 로고    scopus 로고
    • Secure Distributed Cluster Formation in Wireless Sensor Networks
    • Proc. of 22nd Annual Computer Security Applications Conference (ACSAC '06)
    • K. Sun et al., "Secure Distributed Cluster Formation in Wireless Sensor Networks," Proc. of 22nd Annual Computer Security Applications Conference (ACSAC '06), pp. 131-140, 2006
    • (2006) , pp. 131-140
    • Sun, K.1
  • 13
    • 84869064235 scopus 로고    scopus 로고
    • A Secure Cluster Formation Scheme in Wireless Sensor Networks
    • Int'l Journal of Distributed Sensor Networks, Article ID 301750, 14 pages
    • G. Wang, D. Kim, and G. Cho, "A Secure Cluster Formation Scheme in Wireless Sensor Networks," Int'l Journal of Distributed Sensor Networks, vol. 2012, Article ID 301750, 14 pages, 2012
    • (2012) , vol.2012
    • Wang, G.1    Kim, D.2    Cho, G.3
  • 14
    • 74249102449 scopus 로고    scopus 로고
    • Private Cluster Head Election in Wireless Sensor Networks
    • Proc. of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09), IEEE
    • L. Buttyan and T. Holczer, "Private Cluster Head Election in Wireless Sensor Networks," Proc. of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09), IEEE, pp. 1048-1053, 2009
    • (2009) , pp. 1048-1053
    • Buttyan, L.1    Holczer, T.2
  • 15
    • 49649088025 scopus 로고    scopus 로고
    • Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks
    • Proc. of Int'l Sympo. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), Cyprus, Apr.
    • M. Sirivianos et al., "Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks," Proc. of Int'l Sympo. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), Cyprus, pp. 1-10, Apr. 2007
    • (2007) , pp. 1-10
    • Sirivianos, M.1
  • 16
    • 70449578908 scopus 로고    scopus 로고
    • Resilient Cluster Leader Election for Wireless Sensor Networks
    • Proc. of IEEE 6th Annual Comm. Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks(SECON)
    • Q. Dong and D. Liu, "Resilient Cluster Leader Election for Wireless Sensor Networks," Proc. of IEEE 6th Annual Comm. Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks(SECON), pp108-116, 2009
    • (2009) , pp. 108-116
    • Dong, Q.1    Liu, D.2
  • 17
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security Protocols for Sensor Networks
    • Sep.
    • A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1
  • 18
    • 34848925481 scopus 로고    scopus 로고
    • Resilient Cluster Formation for Sensor Networks
    • Proc. of 27th Int'l Conf. on Distributed Computing Systems (ICDCS '07)
    • D. Liu, "Resilient Cluster Formation for Sensor Networks," Proc. of 27th Int'l Conf. on Distributed Computing Systems (ICDCS '07), pp.40-48, 2007
    • (2007) , pp. 40-48
    • Liu, D.1
  • 19
    • 80455162655 scopus 로고    scopus 로고
    • Secure Clustering for Building Certificate Mangement Nodes in Ad-Hoc Networks
    • Proc. of 14th Int'l Conf. on Network-Based Information Systems (NBiS), Tirana, Albania, Sep.
    • I. Nishimura, T. Nagase, Y. Takehana, and Y. Yoshioka, "Secure Clustering for Building Certificate Mangement Nodes in Ad-Hoc Networks," Proc. of 14th Int'l Conf. on Network-Based Information Systems (NBiS), Tirana, Albania, Sep. 07-09, 2011
    • (2011) , pp. 07-09
    • Nishimura, I.1    Nagase, T.2    Takehana, Y.3    Yoshioka, Y.4
  • 20
    • 36348973964 scopus 로고    scopus 로고
    • Cluster-based Reputation and Trust for Wireless Sensor Networks
    • Proc. of the 4th IEEE Consumer Communications and Networking Conference (CCNC '07), Jan.
    • G.V. Crosby and N. Pissinou, "Cluster-based Reputation and Trust for Wireless Sensor Networks," Proc. of the 4th IEEE Consumer Communications and Networking Conference (CCNC '07), pp. 604-608, Jan. 2007
    • (2007) , pp. 604-608
    • Crosby, G.V.1    Pissinou, N.2
  • 21
    • 84863304238 scopus 로고    scopus 로고
    • Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey
    • Jul.
    • P. Schaffer, K. Farkas, A. Horvath, T. Holczer, L. Buttyan, "Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey," Computer Networks, vol. 56, no. 11, pp. 2726-2741, Jul. 2012
    • (2012) Computer Networks , vol.56 , Issue.11 , pp. 2726-2741
    • Schaffer, P.1    Farkas, K.2    Horvath, A.3    Holczer, T.4    Buttyan, L.5
  • 23
    • 33646581008 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography for wireless sensor networks
    • Proc. of 3rd Int'l Conf. on Pervasive Computing and Communications, Kauai, Hawaii, USA, Mar. 8-12
    • A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," Proc. of 3rd Int'l Conf. on Pervasive Computing and Communications, Kauai, Hawaii, USA, Mar. 8-12, 2005
    • (2005)
    • Wander, A.S.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.C.5
  • 24
    • 84897538670 scopus 로고    scopus 로고
    • The network simulator-ns-2, Available: , Dec.
    • The network simulator-ns-2, Available: http://www.isi.edu/nsnam/ns/, Dec. 2012
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.