Skip to main navigation Skip to search Skip to main content

Security and performance analysis of a secure clustering protocol for sensor networks

  • Pubali Banerjee
  • , Doug Jacobson
  • , Soumendra Nath Lahiri

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Clustering protocols are often used in sensor networks. In many deployment scenarios, security is a key concern. In this paper we provide a secure solution to a commonly used clustering protocol, the LEACH protocol. We show that our protocol, the GS-LEACH protocol is more energy efficient than any of the secure flavors of LEACH. The GS-LEACH (grid-based secure LEACH) protocol uses pre deployment key distribution using prior knowledge of the deployment area. We also provide a detailed security analysis of our protocol and show that it is more secure than the secure versions of LEACH. Finally with the results of our simulation experiments we show that our protocol is very energy efficient and provides a longer network lifetime compared to the other flavors of LEACH.

Original languageEnglish
Title of host publicationProceedings - 6th IEEE International Symposium on Network Computing and Applications, NCA 2007
Pages145-152
Number of pages8
DOIs
StatePublished - 2007
Event6th IEEE International Symposium on Network Computing and Applications, NCA 2007 - Cambridge, MA, United States
Duration: Jul 12 2007Jul 14 2007

Publication series

NameProceedings - 6th IEEE International Symposium on Network Computing and Applications, NCA 2007

Conference

Conference6th IEEE International Symposium on Network Computing and Applications, NCA 2007
Country/TerritoryUnited States
CityCambridge, MA
Period07/12/0707/14/07

Fingerprint

Dive into the research topics of 'Security and performance analysis of a secure clustering protocol for sensor networks'. Together they form a unique fingerprint.

Cite this