Title :
The Trustworthiness Based on Hash Chain in Wireless Sensor Network
Author :
Peng, Xiong ; Wei, Zhang
Author_Institution :
Dept. of Comput. Sci. & Technol., East China Normal Univ., Shanghai
Abstract :
With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. The work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. The results indicate clearly that resisting DoS can be achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.
Keywords :
cryptography; mobile radio; telecommunication network routing; telecommunication security; wireless sensor networks; DoS-style flooding attack; hash chain based trustworthiness; mobile sensor network; route discovery process; wireless sensor networ; Analytical models; Computer science; Cryptography; Floods; Materials science and technology; Relays; Resists; Signal processing algorithms; Ubiquitous computing; Wireless sensor networks; Denial of Service (DOS); Hash Chain; wireless sensor network;
Conference_Titel :
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3492-3
DOI :
10.1109/EUC.2008.43