@inproceedings{4508e89a534c430c93b645cbec1490ae,
title = "The trustworthiness based on hash chain in wireless sensor network",
abstract = "With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. The work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. The results indicate clearly that resisting DoS can be achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.",
keywords = "Denial of service(DOS), Hash chain, Wireless sensor network",
author = "Peng Xiong and Wei Zhang",
year = "2008",
doi = "10.1109/EUC.2008.43",
language = "英语",
isbn = "9780769534923",
series = "Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008",
pages = "101--106",
booktitle = "Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008",
note = "5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 ; Conference date: 17-12-2008 Through 20-12-2008",
}