Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2010 | Volume: 9 | Issue: 4 | Page No.: 740-748
DOI: 10.3923/itj.2010.740.748
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks

Ang Gao, Wei Wei and Xiangrong Xiao

Abstract:
Wireless Sensor Networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. Secure authentication between the two participating entities is of typical defense against data modified and fabricated by an adversary. In this study, considering environment and dynamic topology having a significant impact on the communication radius of sensor, we proposed a secure Multi-hop authentication scheme: the data message source is verified with keys derived from multiple one-way hash sub-chains related to communication radius of node, while offering greater resilience against node compromised by designing the hash chain length which guarantees that sub-chains are picked with the low probability of overlap between two or more sensors. Compared to existing solution, the proposed method greatly alleviates extra memory space taken and lower energy consumption extends the network lifetime benefiting from the distributed strategy.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Analysis of Wireless Link Characteristics in RFID Location-network
  •    Mining Data Generated by Sensor Networks: A Survey
  •    Wavelet-based Kalman Filter for Traffic Flow Forecasting in Sensornets
  •    Dynamic Analysis of Kalman Filter for Traffic Flow Forecasting in Sensornets
  •    Perfect Forward Secrecy of Authentication and Key Exchange Protocols in Three Versions of WAPI
  •    DOSM: A Data-Oriented Security Model Based on Information Hiding in WSNs
How to cite this article:

Ang Gao, Wei Wei and Xiangrong Xiao, 2010. Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks. Information Technology Journal, 9: 740-748.

DOI: 10.3923/itj.2010.740.748

URL: https://scialert.net/abstract/?doi=itj.2010.740.748

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom