Clustering Routing Protocol Based on Base Station Authentication with TLEACH in WSN

Article Preview

Abstract:

This paper introduced a new safety and energy saved routing protocol BSATLEACH, it is focus on existing issues of protocols in wireless sensor networks (WSNs) what just considered energy saving only without security concern or designed for security only ignored large overheads and complex algorithm, so on. This protocol is built up based on TLEACH protocol, utilized Base Station to authenticate the identity of nodes, combined the identity trust and the behavior trust, and considered the factor of residual energy in nodes. It balanced above existing issues of protocols in WSNs. The results come from analysis and simulation in MATLAB shown that this new protocol can provide excellent security in WSNs and can extend the lifetime of network efficiently.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 734-737)

Pages:

3107-3113

Citation:

Online since:

August 2013

Authors:

Export:

Price:

[1] Heinzelman W R, Chandrakasan A, Balakrishnan H: Energy-efficient communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conf. on System Sciences. (2000)

DOI: 10.1109/hicss.2000.926982

Google Scholar

[2] Ferreira A.C,Oliveira L B,Habib E,et al.On the security of cluster-based communication protocols for wireless sensor networks[C]//LNCS 3420:ICN 2005.Berlin Heidelberg:SpringerVerlag.(2005)

Google Scholar

[3] Oliveira L B,Wong H C,Bern M,et al.Sec LEACH--A Random Key Distribution Solution for securing Clustered Sensor Networks[C]//Fifth IEEE International Symposium on Network Computing and Applications(NCA'06).(2006)

DOI: 10.1109/nca.2006.48

Google Scholar

[4] Song Fei, Research of Secure Routing Mechanism in Wireless Sensor Network[D]. Anhui:University of Science and Technology of China.(2009)

Google Scholar

[5] Chen Lu, Research on Trust Model and Its Application in Wireless Sensor Networks[D].Jiangsu: Nanjing University of Posts and Telecommunications.(2010)

Google Scholar

[6] Abraham J,Ramanatha K S.A complete set of protocols for distributed key management in clustered sensor networks[C]//Proceedings of International Conference on Multimedia and Ubiquitous Engineering.(2007)

DOI: 10.1109/mue.2007.6

Google Scholar