Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.10.801

IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment  

Cho, Young-Bok (충북대학교 전자정보대학 소프트웨어학과)
Woo, Seng-Hee (한국교통대학교 의료정보공학과)
Lee, Sang-Ho (충북대학교 전자정보대학 소프트웨어학과)
Abstract
WSN consists of hundreds to thousands of sensor nodes. In order to solve the problem of energy consumption imbalance cluster head is reelected in every round, while node authentication scheme is utilized for secure communication. However, re-clustering increases the overhead of sensor nodes and during the node authentication phase the frequent AREQ/AREP message exchange also increases the overhead. Therefore, a secure and energy efficient protocol, by which overhead of sensor nodes is reduced and long time communication is achieved, is required for wireless sensor network. In this paper, an energy efficient and reliable IDE-LEACH protocol for WSN is proposed. The proposed protocol is prolongs networks lifetime about average 20% compared to the LEACH-based protocols and all attending nodes in communication form BS authentication consisted of trusted nodes.
Keywords
Wireless Sensor Network; Authentication; LEACH; IDE; Energy Efficiency; Trust;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Commun., vol. 11, no. 6, pp. 6-28, Dec. 2004.
2 W. S. Juang, "Efficient user authentication and key agreement in wireless sensor networks," in Proc. Int. Workshop Inform. Security Applicat. (WISA '06), pp. 15-29, Jeju Island, Korea, Aug. 2006.
3 T. T. Huyen and E. N. Huh, "A reliable 2-mode authentication framework for ubiquitous sensor network," J. Korean Soc. Internet Inform. (KSII), vol.10, no.3, pp. 51-60 Jun. 2008.
4 T. T. Huyen and E. N. Huh, "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network," in Proc. Int. Conf. Ubiquitous Inform. Management Commun. (ICUIMC'08), pp. 441-447, Suwon, Korea, Jan.-Feb. 2008.
5 C. Perrig, "SPINS: security protocols for sensor networks," J. ACM Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002.   DOI   ScienceOn
6 S. H. Lee and J. B. Suk, "Improvement of energy efficiency of LEACH protocol for wireless sensor networks," J. Korea Inform. Commun. Soc. (KICS), vol. 33, no. 2, pp. 76-81, Feb. 2008.   과학기술학회마을
7 G. Yang, C. M. Rong, C. Veigner, J. T. Wang, and H. B. Cheng, "Identity-based key agreement and encryption for wireless sensor networks," J. China Univ. Posts Telecommun., vol. 12, no. 4, pp. 54-60, Dec. 2006.
8 B. S. Kim and H. B. Lim, "A study on node authentication mechanism using sensor node's energy value in WSN," J. Inst. Electron. Eng. Korea (IEEK), vol. 48, no. 2, pp. 86-95, Mar. 2011.
9 Y. Y. Choo, H. J. Choi, and J. W. Kwon, "Algorithm improving network life-time based on LEACH protocol," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 35, no. 8. pp. 810-819, Aug. 2010.   과학기술학회마을
10 M. L. Kim, H. S. Kim, and Y. D. Son, "The conversion method from ID-based encryption to ID-based dynamic threshold encryption," J. Korea Inst. Inform. Security Cryptology (KIISC), vol. 22, no. 4, pp. 733-744, Aug. 2012.   과학기술학회마을
11 H. Chan and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks," in Proc. IEEE INFOCOM Conf., pp. 524-535, Miami, U.S.A., Mar. 2005.
12 Y. B. Cho and S. H. Lee, "An IDE based hierarchical node authentication protocol for secure data transmission in WSN environment," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 37B, no. 3, pp. 149-157, Mar. 2012.   과학기술학회마을   DOI   ScienceOn
13 D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Advances Cryptology Conf. (CRYPTO 2001), pp. 213-229, Santa Barbara, U.S.A., Aug. 2001.
14 A. Shamir, "Identity-based crypto systems and signature schemes," in Proc. Advances Cryptology (CRYPTO 84), pp. 47-53, Santa Barbara, U.S.A., Aug. 1984.