JOURNAL BROWSE
Search
Advanced SearchSearch Tips
IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment
Cho, Young-Bok; Woo, Seng-Hee; Lee, Sang-Ho;
  PDF(new window)
 Abstract
WSN consists of hundreds to thousands of sensor nodes. In order to solve the problem of energy consumption imbalance cluster head is reelected in every round, while node authentication scheme is utilized for secure communication. However, re-clustering increases the overhead of sensor nodes and during the node authentication phase the frequent AREQ/AREP message exchange also increases the overhead. Therefore, a secure and energy efficient protocol, by which overhead of sensor nodes is reduced and long time communication is achieved, is required for wireless sensor network. In this paper, an energy efficient and reliable IDE-LEACH protocol for WSN is proposed. The proposed protocol is prolongs networks lifetime about average 20% compared to the LEACH-based protocols and all attending nodes in communication form BS authentication consisted of trusted nodes.
 Keywords
Wireless Sensor Network;Authentication;LEACH;IDE;Energy Efficiency;Trust;
 Language
Korean
 Cited by
1.
태양 에너지 수집형 센서 네트워크에서 모바일 싱크를 지원하기 위한 클러스터 기반 에너지 인지 데이터 공유 기법,이홍섭;이준민;김재웅;노동건;

정보과학회 논문지, 2015. vol.42. 11, pp.1430-1440 crossref(new window)
2.
안전한 개인의료정보 서비스를 위한 HIDE 기반의 그룹서명,조영복;우성희;이상호;박종배;

한국정보통신학회논문지, 2015. vol.19. 10, pp.2481-2490 crossref(new window)
3.
WSN환경에서 센서노드의 생명주기 연장을 위한 고정 분할 기법,한창수;조영복;우성희;이상호;

한국정보통신학회논문지, 2016. vol.20. 5, pp.942-948 crossref(new window)
1.
On the HIDE based Group Signature for Secure Personal Healthcare Record Service, Journal of the Korea Institute of Information and Communication Engineering, 2015, 19, 10, 2481  crossref(new windwow)
 References
1.
J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Commun., vol. 11, no. 6, pp. 6-28, Dec. 2004.

2.
W. S. Juang, "Efficient user authentication and key agreement in wireless sensor networks," in Proc. Int. Workshop Inform. Security Applicat. (WISA '06), pp. 15-29, Jeju Island, Korea, Aug. 2006.

3.
T. T. Huyen and E. N. Huh, "A reliable 2-mode authentication framework for ubiquitous sensor network," J. Korean Soc. Internet Inform. (KSII), vol.10, no.3, pp. 51-60 Jun. 2008.

4.
T. T. Huyen and E. N. Huh, "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network," in Proc. Int. Conf. Ubiquitous Inform. Management Commun. (ICUIMC'08), pp. 441-447, Suwon, Korea, Jan.-Feb. 2008.

5.
C. Perrig, "SPINS: security protocols for sensor networks," J. ACM Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002. crossref(new window)

6.
S. H. Lee and J. B. Suk, "Improvement of energy efficiency of LEACH protocol for wireless sensor networks," J. Korea Inform. Commun. Soc. (KICS), vol. 33, no. 2, pp. 76-81, Feb. 2008.

7.
G. Yang, C. M. Rong, C. Veigner, J. T. Wang, and H. B. Cheng, "Identity-based key agreement and encryption for wireless sensor networks," J. China Univ. Posts Telecommun., vol. 12, no. 4, pp. 54-60, Dec. 2006.

8.
B. S. Kim and H. B. Lim, "A study on node authentication mechanism using sensor node's energy value in WSN," J. Inst. Electron. Eng. Korea (IEEK), vol. 48, no. 2, pp. 86-95, Mar. 2011.

9.
Y. Y. Choo, H. J. Choi, and J. W. Kwon, "Algorithm improving network life-time based on LEACH protocol," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 35, no. 8. pp. 810-819, Aug. 2010.

10.
M. L. Kim, H. S. Kim, and Y. D. Son, "The conversion method from ID-based encryption to ID-based dynamic threshold encryption," J. Korea Inst. Inform. Security Cryptology (KIISC), vol. 22, no. 4, pp. 733-744, Aug. 2012.

11.
H. Chan and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks," in Proc. IEEE INFOCOM Conf., pp. 524-535, Miami, U.S.A., Mar. 2005.

12.
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Advances Cryptology Conf. (CRYPTO 2001), pp. 213-229, Santa Barbara, U.S.A., Aug. 2001.

13.
A. Shamir, "Identity-based crypto systems and signature schemes," in Proc. Advances Cryptology (CRYPTO 84), pp. 47-53, Santa Barbara, U.S.A., Aug. 1984.

14.
Y. B. Cho and S. H. Lee, "An IDE based hierarchical node authentication protocol for secure data transmission in WSN environment," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 37B, no. 3, pp. 149-157, Mar. 2012. crossref(new window)