By Topic

The Trustworthiness Based on Hash Chain in Wireless Sensor Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Xiong Peng ; Dept. of Comput. Sci. & Technol., East China Normal Univ., Shanghai ; Zhang Wei

With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. The work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. The results indicate clearly that resisting DoS can be achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.

Published in:

Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on  (Volume:2 )

Date of Conference:

17-20 Dec. 2008