{"title":"Secure self organization of wireless sensor network: A new approach","authors":"H. Kalita, A. Kar","doi":"10.1109/COMSNETS.2010.5431968","DOIUrl":null,"url":null,"abstract":"Self organization is an important phase of a wireless sensor network. Thousands of Sensors are deployed in a large geographical area randomly without considering the location factor. After deployment, sensors nodes are required to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission. Also, security is an important aspect while forming the network initially. Only the authorized nodes should be allowed to join the network. In this paper, we discuss our secure self organization algorithm.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS.2010.5431968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Self organization is an important phase of a wireless sensor network. Thousands of Sensors are deployed in a large geographical area randomly without considering the location factor. After deployment, sensors nodes are required to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission. Also, security is an important aspect while forming the network initially. Only the authorized nodes should be allowed to join the network. In this paper, we discuss our secure self organization algorithm.