The Trustworthiness Based on Hash Chain in Wireless Sensor Network

With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. The scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. The work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. The results indicate clearly that resisting DoS can be achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.

[1]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[2]  Hisashi Kobayashi,et al.  Guaranteed delivery flooding protocols for mobile ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[3]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[4]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[5]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[6]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[7]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[8]  S. Buchegger,et al.  A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .

[9]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[10]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[11]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Yaping Li,et al.  ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .

[14]  Farouk Kamoun,et al.  Hierarchical Routing for Large Networks; Performance Evaluation and Optimization , 1977, Comput. Networks.