2007 | OriginalPaper | Chapter
Secure Cluster Header Election Techniques in Sensor Network
Authors : Pungho Lee, Jimmook Kim, Insung Han, Hwangbin Ryou, Woo Hyun Ahn
Published in: Frontiers of High Performance Computing and Networking ISPA 2007 Workshops
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network.
In this paper, first each node transmit residual electric power and authentication message to BS(Base-Station). BS reflects “
Validity Authentication Rate
” and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates “
Validity Authentication Rate
” of former round. Finally, BS can select more secure cluster header.