Abstract
LEACH is the first protocol of wireless sensor networks based on clustering and layered structure technology, but the security problem related to the wireless sensor network is not considered. Therefore, it is necessary to provide an efficient security routing algorithm for practical wireless sensor networks. In this paper, we proposed a LEACH-based key management scheme for wireless sensor networks based on Exclusion Basis Systems and μ TESLA. We use EBS for key generation and distribution, and use μ TESLA to guarantee the cluster head can update security key after the first round. The proposed algorithm decreases the storage requirements of keys, and the network communications load for updating cluster keys. The key management scheme can enhance the survivability and ensure the security of WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., et al.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)
Pottie, G.J., Kaiser, W.I.: Wireless integrated network sensors. Communications of the ACM 43(5), 51–58 (2000)
Heinzelman, W.R., Wendi, B., et al.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Paper Presented at the Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, pp. 1–10 (2000)
Younis, M., Youssef, M., Arisha, K.: Energy-Aware Routing in Cluster-Based Sensor Networks. Energy-Awarerouting, 129–136 (2002)
Eltoweissy, M., Heydari, H., Morales, L., Sudborough, H.: Combinatorial Optimization for Key Management in Secure Multicast Environments. Network and System Management (2004)
Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)
Oliveira, L.B., Wong, H.C., Bern, M., Loureiro, A.A.F.: SecLEACH-A Random Key Distribution Solution for Securing Clustered Sensor Networks (2006)
Ding, H., Geng, Y., Bin, L.: Computer Engineering and Applications. Computer Engineering and Applications, 157–160 (2008)
Kong, F., Li, C.-W., Ding, Q.-Q., et al.: An EBS-Based Dynamic Key Management Scheme for Wireless Sensor Networks. Journal of Electronics & Information Technology 31(5) (2009)
Eltoweissy, M., Youois, M., Ghumman, K.: Lightweight Key Management for Wireless Sensor Networks, pp. 813–818 (2004)
Perrig, A., Szewczyk, R., et al.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)
Chorzempa, M., Park, J.-M., et al.: Key management for long-lived sensor networks in hostile environments. Computer Communications 30(3), 1964–1979 (2007)
Cheng, H., Wang, J., Yang, G.: Research of Secure Frame Protocol Based on SPINS. Computer Science 33(8) (2006)
Wang, J., Yang, G., Chen, S.: Secure LEACH Routing Protocol Based on Optimal Number of Head Nodes for W ireless Sensor Network. Journal of Nanjing University of Posts and Telecommunications (Natural Science) 28(3) (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Wang, J., Zheng, L., Zhao, L., Tian, D. (2012). LEACH-Based Security Routing Protocol for WSNs. In: Jin, D., Lin, S. (eds) Advances in Computer Science and Information Engineering. Advances in Intelligent and Soft Computing, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30223-7_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-30223-7_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30222-0
Online ISBN: 978-3-642-30223-7
eBook Packages: EngineeringEngineering (R0)