Title :
Resilient Cluster Formation for Sensor Networks
Author_Institution :
CSE Dept., Univ. of Texas at Arlington, Arlington, TX
Abstract :
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, an attacker can easily mislead a cluster-based application by attacking the clustering protocol. This paper proposes three techniques for resilient cluster formation. The simple neighbor validation provides a simple yet effective way to validate a sensor´s neighbors; the priority-based selection organizes clusters basedon the sensor´s priority of being a cluster head; and the centralized detection further enhances the security by detecting misbehaving nodes. Another appealing benefit of this protocol is that a sensor node can make a clustering decision immediately once the neighborhood information is available. This further increases the difficulty of attacking the clustering protocol. The analysis also shows that the proposed protocol is efficient and effective in dealing with attacks.
Keywords :
pattern clustering; protocols; telecommunication security; wireless sensor networks; clustering protocol; distributed sensor network; misbehaving node detection; network security; priority-based selection; resilient cluster formation; Authentication; Computer networks; Cryptography; Electronic mail; Information security; Laboratories; Personal digital assistants; Portable computers; Protection; Protocols;
Conference_Titel :
Distributed Computing Systems, 2007. ICDCS '07. 27th International Conference on
Conference_Location :
Toronto, ON
Print_ISBN :
0-7695-2837-3
Electronic_ISBN :
1063-6927
DOI :
10.1109/ICDCS.2007.131