首页 | 本学科首页   官方微博 | 高级检索  
     检索      

SLEACH: Secure Low.Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks
作者姓名:WANGXiao-yun  YANGLi-zhen  CHENKe-fei
作者单位:[1]DepartmentofComputerScienceandEngineering,ShanghaiJiaotongUniversity,Shanghai200030,China//DepartmentofInformationandCommunication,TongjiUniversity,Shanghai200092,China [2]DepartmentofComputerScienceandEngineering,ShanghaiJiaotongUniversity,Shanghai200030,China
基金项目:SupportedbytheNationalNaturalScienceFoundationofChina(90104005)
摘    要:LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, a secure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensive cryptographic operations to each part of the protocol functionality to create an efficient, practical protocol. Then we give security analyses of SLEACH. Our security analyses show that our scheme is robust against any external attacker or compromised nodes in the sensor network

关 键 词:无线传感器网络  路由协议  计算机安全  低能自适应聚类层级协议
收稿时间:30 May 2004

SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks
WANGXiao-yun YANGLi-zhen CHENKe-fei.SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131.
Authors:Wang Xiao-yun  Yang Li-zhen  Chen Ke-fei
Institution:(1) Department of Computer Science and Engineering, Shanghai Jiaotong University, 200030 Shanghai, China;(2) Department of Information and Communication, Tongji University, 200092 Shanghai, China
Abstract:LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, a secure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensive cryptographic operations to each part of the protocol functionality to create an efficient, practical protocol. Then we give security analyses of SLEACH. Our security analyses show that our scheme is robust against any external attacker or compromised nodes in the sensor network
Keywords:wireless sensor network  routing protocol  security
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号