z-logo
open-access-imgOpen Access
Cluster Head Monitoring Nodes Secret Selection Protocol in Sensor Networks
Author(s) -
Jing Yuan,
Hongwei Zhou
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/782/3/032087
Subject(s) - computer science , node (physics) , computer network , wireless sensor network , cluster (spacecraft) , protocol (science) , sensor node , key distribution in wireless sensor networks , engineering , telecommunications , wireless network , structural engineering , pathology , wireless , medicine , alternative medicine
In sensor networks, as the data collection point of nodes in the cluster, cluster head is easy to be the key target of attack. Once the cluster head node is controlled by the attacker, it will have a fatal impact on the security of the network. In order to solve the above problem, this paper proposes a cluster head monitoring nodes secret selection protocol. It uses secret selection algorithm to select the cluster head monitoring node from the neighbor nodes of the cluster head node. Thus, the attacker can not confirm the monitoring node, it results that the cluster head node can not be attacked. The protocol uses the spatio-temporal correlation between cluster head and cluster head monitoring nodes. Once it finds that cluster head node is suspected anomaly, it reports immediately to sink node. The analysis of protocol security shows that the protocol can meet the energy efficiency of sensor network and ensure the security of the system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here