Journal of Northeastern University ›› 2009, Vol. 30 ›› Issue (1): 63-66+82.DOI: -

• OriginalPaper • Previous Articles     Next Articles

A cluster-based security protocol in wireless sensor networks

Wang, Gang (1); Wen, Tao (1); Guo, Quan (2); Ma, Xue-Bin (1)   

  1. (1) Software Center, Northeastern University, Shenyang 110004, China; (2) Department of Computer Science and Technology, Neusoft Information Institute, Dalian 116023, China
  • Received:2013-06-22 Revised:2013-06-22 Online:2009-01-15 Published:2013-06-22
  • Contact: Wang, G.
  • About author:-
  • Supported by:
    -

Abstract: The CBSP (cluster-based security protocol) is proposed to enhance the original SPINS and SECOS protocols. In CBSP the security for clusterhead election and the updating mechanism of broadcast-based authentication key can efficiently improve the security of cluster and key management, thus reducing the number of nodes and consumption of network resources. The strand space model is used to make formalized analysis of the proposed protocol, and its correctness is verified. With the cluster-based intrusion detection system in CBSP, the attack from external nodes can be efficiently resisted. The updating cycles of clusterhead and key are shortened due to the response updating mechanism of IDS, and then the CBSP is further optimized. Simulation result showed that CBSP is available to adapt well the characteristics of WSN, especially when WSN suffers the selected or retransmitted attacks the CBSP will resist them effectively so as to reduce the damage to WSN resources.

CLC Number: