Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37B.2.138

A Specification-based Intrusion Detection Mechanism for LEACH Protocol  

Lee, Yun-Ho (국방대학교 국방정보체계학과)
Kang, Jung-Ho (아주대학교 NCW학과)
Lee, Soo-Jin (국방대학교 국방정보체계학과)
Abstract
With the improvement of wireless communication and embedded technology, WSN is used at various fields. Meanwhile, because WSN is resource constrained, it is more vulnerable than other networks. To solve the security problem of WSN, we can use the traditional secure mechanism like as cryptography and authentication. But the traditional secure mechanism is not enough for all security issues that may be happened in WSN, especially attacks caused by the compromised node. So, we need the IDS as the second secure mechanism for WSN. In this paper, we propose the Specification-based Intrusion Detection Mechanism that makes LEACH, which is one of the clustering routing protocol for WSN, more reliable and safety.
Keywords
LEACH; specification; WSN;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Zhang and W. Lee, "Intrusion Detection Techniques for Mogile Ad Hoc Networks", ACM WINET Journal, 2003.
2 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," IEEE Transactions on Wireless Communications, vol:1, Issue:4, pp.660-670, Oct. 2002   DOI   ScienceOn
3 L. Eschenauer and V.D. Gligor, "A key management scheme for distributed sensor networks," In Proceeding of the 9th ACM conference on Computer and Communications Security. pp.41-47, Nov. 2002
4 Leonardo B. Oliveira, Hao C. Wong, M. Bern, Ricardo Dahab, A. A. F. Loureiro. "SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks". Fifth IEEE International Symposium on Network Computing and Applications, pp.145-154, July 2006.
5 P. Banerjee, D. Jacobson, and S. N. Lahiri. "Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks". IEEE Proceedings of the 6th IEEE International Symposium on Network Computing and Applications, pp.145-152, July 2007.
6 D. Wagner, "Resilient Aggregation Sensor Networks", ACM SASN '04, Washington DC, 2004, pp. 78-87
7 Y. Yang et al., "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks", ACM Mobihoc '06, Florence, Italy 2006, pp 356-367
8 L. Buttyan, P. Schaffer, and I. Vajda, "RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks", ACMSAAN '06, Alexandria, VA, 2006, pp. 83-90