跳到主要导航 跳到搜索 跳到主要内容

The trustworthiness based on hash chain in wireless sensor network

  • Peng Xiong*
  • , Wei Zhang
  • *此作品的通讯作者
  • East China Normal University
  • Nanchang Hangkong University

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. The work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. The results indicate clearly that resisting DoS can be achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.

源语言英语
主期刊名Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
101-106
页数6
DOI
出版状态已出版 - 2008
活动5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, 中国
期限: 17 12月 200820 12月 2008

出版系列

姓名Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
2

会议

会议5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
国家/地区中国
Shanghai
时期17/12/0820/12/08

指纹

探究 'The trustworthiness based on hash chain in wireless sensor network' 的科研主题。它们共同构成独一无二的指纹。

引用此