A Specification-based Intrusion Detection Mechanism for LEACH Protocol 


Vol. 37,  No. 2, pp. 138-147, Feb.  2012


PDF
  Abstract

With the improvement of wireless communication and embedded technology, WSN is used at various fields. Meanwhile, because WSN is resource constrained, it is more vulnerable than other networks. To solve the security problem of WSN, we can use the traditional secure mechanism like as cryptography and authentication. But the traditional secure mechanism is not enough for all security issues that may be happened in WSN, especially attacks caused by the compromised node. So, we need the IDS as the second secure mechanism for WSN. In this paper, we propose the Specification-based Intrusion Detection Mechanism that makes LEACH, which is one of the clustering routing protocol for WSN, more reliable and safety.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Lee, J. Kang, S. Lee, "A Specification-based Intrusion Detection Mechanism for LEACH Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 2, pp. 138-147, 2012. DOI: .

[ACM Style]

Yunho Lee, Jungho Kang, and Soojin Lee. 2012. A Specification-based Intrusion Detection Mechanism for LEACH Protocol. The Journal of Korean Institute of Communications and Information Sciences, 37, 2, (2012), 138-147. DOI: .

[KICS Style]

Yunho Lee, Jungho Kang, Soojin Lee, "A Specification-based Intrusion Detection Mechanism for LEACH Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 2, pp. 138-147, 2. 2012.