首页 | 本学科首页   官方微博 | 高级检索  
     

SLEACH: Secure Low.Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks
引用本文:WANGXiao-yun YANGLi-zhen CHENKe-fei. SLEACH: Secure Low.Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J]. 武汉大学学报:自然科学英文版, 2005, 10(1): 127-131. DOI: 10.1007/BF02828633
作者姓名:WANGXiao-yun YANGLi-zhen CHENKe-fei
作者单位:[1]DepartmentofComputerScienceandEngineering,ShanghaiJiaotongUniversity,Shanghai200030,China//DepartmentofInformationandCommunication,TongjiUniversity,Shanghai200092,China [2]DepartmentofComputerScienceandEngineering,ShanghaiJiaotongUniversity,Shanghai200030,China
基金项目:SupportedbytheNationalNaturalScienceFoundationofChina(90104005)
摘    要:LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, a secure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensive cryptographic operations to each part of the protocol functionality to create an efficient, practical protocol. Then we give security analyses of SLEACH. Our security analyses show that our scheme is robust against any external attacker or compromised nodes in the sensor network

关 键 词:无线传感器网络 路由协议 计算机安全 低能自适应聚类层级协议
收稿时间:2004-05-30

SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks
Wang Xiao-yun,Yang Li-zhen,Chen Ke-fei. SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2005, 10(1): 127-131. DOI: 10.1007/BF02828633
Authors:Wang Xiao-yun  Yang Li-zhen  Chen Ke-fei
Affiliation:(1) Department of Computer Science and Engineering, Shanghai Jiaotong University, 200030 Shanghai, China;(2) Department of Information and Communication, Tongji University, 200092 Shanghai, China
Abstract:LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, a secure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensive cryptographic operations to each part of the protocol functionality to create an efficient, practical protocol. Then we give security analyses of SLEACH. Our security analyses show that our scheme is robust against any external attacker or compromised nodes in the sensor network
Keywords:wireless sensor network  routing protocol  security
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号