Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2523514.2523565acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
extended-abstract

Development of a secure cluster-based wireless sensor network model

Published: 26 November 2013 Publication History

Abstract

In this paper we consider a clustering wireless sensor network which needs to be protected. The main aim of this article is development of a secure clustering wireless sensor network model with built-in detection and counteraction mechanisms against malicious impacts (attacks). Trust level calculation algorithm and cluster head (CH) election algorithm are introduced and secure clustering WSN model is described.

References

[1]
K. Akkaya and M. Younis, A survey on routing protocols for wireless sensor networks. Elsevier Journal of Ad Hoc Networks 3 (3): 325--349. 2005
[2]
E. S Abramov, E. S. Basan. Analysis of scenarios attacks at Wireless sensor networks. In Proceedings of XIII International Scientific Conference "Information Security 2013". Vol. 1. -- Taganrog, pages 60--72. 2013.
[3]
E. S. Abrams, E. S. Basan Development of intrusion detection system for wireless sensor networks. In Proceedings of XIII International Scientific Conference "Information Security 2013". Vol. 1. -- Taganrog, pages 72--79.2013.
[4]
Wang, S. S., K. Q. Yan, S. C. Wang, C. W. Liu. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks. Expert Syst. Appli., 38: 15234--15243. 2011.
[5]
S. N. Teplitskaya, Ya. T. Hussein. Energy-efficient algorithm for self-organization in a wireless sensor network. East European Journal of advanced technology 2/9 (56): 25--29. 2012.
[6]
T. Zahariadis1, HC Leligou1, P. Trakadas and S. Voliotis1. Trust management in wireless sensor networks. In Eur. Trans. Telecomms, pages 386--395. 2010.
[7]
K. L. Mills. A brief survey of self-organization in wirel ess sensor networks. Wireless Communications and Mobile Computing. 7(7): 823--834. 2007.
[8]
P. Chatterjee. Trust based clustering and secure routing scheme for mobile Ad Hoc networks. International Journal of Computer Networks & Communications (IJCNC): 386--395. 2010.
[9]
E. S. Abramov, A. V. Andreev, D. V. Mordvin, O. B. Makarevich. 2011. Corporate networks security evaluation based on attack graphs. In Proceedings of the 4th international conference on Security of information and networks (SIN '11). ACM, New York, NY, USA: 29--36. DOI=http://doi.acm.org/10.1145/2070425.2070433

Cited By

View all
  • (2017)A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2017.14(369-372)Online publication date: Oct-2017
  • (2016)Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor NetworkProceedings of the 9th International Conference on Security of Information and Networks10.1145/2947626.2951954(116-122)Online publication date: 20-Jul-2016
  • (2016)Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2016.85(409-412)Online publication date: Oct-2016
  • Show More Cited By

Index Terms

  1. Development of a secure cluster-based wireless sensor network model

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
    November 2013
    483 pages
    ISBN:9781450324984
    DOI:10.1145/2523514
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    • Macquarie U., Austarlia
    • MNIT: Malaviya National Institute of Technology
    • Aksaray Univ.: Aksaray University
    • SFedU: Southern Federal University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 November 2013

    Check for updates

    Author Tags

    1. algorithms
    2. anomaly detection
    3. attacks
    4. authenticity
    5. clustering
    6. intrusion detection method
    7. trust
    8. trust evaluation
    9. wireless sensor networks

    Qualifiers

    • Extended-abstract

    Funding Sources

    Conference

    SIN '13
    Sponsor:
    • MNIT
    • Aksaray Univ.
    • SFedU

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2017.14(369-372)Online publication date: Oct-2017
    • (2016)Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor NetworkProceedings of the 9th International Conference on Security of Information and Networks10.1145/2947626.2951954(116-122)Online publication date: 20-Jul-2016
    • (2016)Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2016.85(409-412)Online publication date: Oct-2016
    • (2015)Trust management system for mobile cluster-based wireless sensor networkProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2800001(203-209)Online publication date: 8-Sep-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media