HOME JOURNALS CONTACT

Information Technology Journal

Year: 2010 | Volume: 9 | Issue: 4 | Page No.: 740-748
DOI: 10.3923/itj.2010.740.748
Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks
Ang Gao, Wei Wei and Xiangrong Xiao

Abstract: Wireless Sensor Networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. Secure authentication between the two participating entities is of typical defense against data modified and fabricated by an adversary. In this study, considering environment and dynamic topology having a significant impact on the communication radius of sensor, we proposed a secure Multi-hop authentication scheme: the data message source is verified with keys derived from multiple one-way hash sub-chains related to communication radius of node, while offering greater resilience against node compromised by designing the hash chain length which guarantees that sub-chains are picked with the low probability of overlap between two or more sensors. Compared to existing solution, the proposed method greatly alleviates extra memory space taken and lower energy consumption extends the network lifetime benefiting from the distributed strategy.

Fulltext PDF Fulltext HTML

How to cite this article
Ang Gao, Wei Wei and Xiangrong Xiao, 2010. Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks. Information Technology Journal, 9: 740-748.

Related Articles:
© Science Alert. All Rights Reserved