The trustworthiness based on hash chain in wireless sensor network

  • Peng Xiong*
  • , Wei Zhang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. The work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. The results indicate clearly that resisting DoS can be achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.

Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Pages101-106
Number of pages6
DOIs
StatePublished - 2008
Event5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China
Duration: 17 Dec 200820 Dec 2008

Publication series

NameProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Volume2

Conference

Conference5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Country/TerritoryChina
CityShanghai
Period17/12/0820/12/08

Keywords

  • Denial of service(DOS)
  • Hash chain
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'The trustworthiness based on hash chain in wireless sensor network'. Together they form a unique fingerprint.

Cite this