Security Analysis and Improvement of Secure and Dynamic Clustering Protocol

Article Preview

Abstract:

In this paper, we analyze a secure and dynamic clustering protocol SecDEACH. Through analysis, we show that the protocol is vulnerable to the wormhole attack since it does not consider the verification of the neighbor nodes within its radio range. We give a wormhole attack to the protocol and propose an improved version which can keep the frame of the SecDEACH protocol and overcome the security shortages. Finally, we make an analysis of the improved protocol and conclude the paper.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1014-1017

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ferreira, A.C., Vilaca, M.A., etal.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds. ) ICN2005. LNCS, vol. 3420, p.449–458. Springer, Heidelberg (2005).

Google Scholar

[2] Oliveira, L.B., Ferreira,A., etal.: Secleach-on the security of clustered sensor networks. Signal Process 87(12), 2882–2895(2007).

DOI: 10.1016/j.sigpro.2007.05.016

Google Scholar

[3] M. Sirivianos, D. Westhoff, F. Armknecht and J. Girao, Non-manipulable aggregator node election for wireless sensor networks, in ICST WiOpt, Jan. (2007).

DOI: 10.1109/wiopt.2007.4480031

Google Scholar

[4] Dong,Q., Liu,D.: Resilient Cluster Leader Election for Wireless Sensor Networks. In: Proceedings of The IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June2009, p.1–9(2009).

DOI: 10.1109/sahcn.2009.5168966

Google Scholar

[5] Young-Ju Han, Min-Woo Park, and Tai-Myoung Chung,SecDEACH : Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs, in International Conference on Computational Science and Applications ICCSA (2010).

DOI: 10.1007/978-3-642-12179-1_14

Google Scholar

[6] Majid Khabbazian, Hugues Mercier, and Vijay K. Bhargava: Severity Analysis and Countermeasure for the Wormhole Attack in Wireless AdHoc Networks. IEEE TRANSACTIONS on wireless communications, on VOL. 8, NO. 2, FEBRUARY (2009).

DOI: 10.1109/twc.2009.070536

Google Scholar