Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Information Technology Journal

Year: 2010  |  Volume: 9  |  Issue: 4  |  Page No.: 740 - 748

Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks

Ang Gao, Wei Wei and Xiangrong Xiao

Abstract

Wireless Sensor Networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. Secure authentication between the two participating entities is of typical defense against data modified and fabricated by an adversary. In this study, considering environment and dynamic topology having a significant impact on the communication radius of sensor, we proposed a secure Multi-hop authentication scheme: the data message source is verified with keys derived from multiple one-way hash sub-chains related to communication radius of node, while offering greater resilience against node compromised by designing the hash chain length which guarantees that sub-chains are picked with the low probability of overlap between two or more sensors. Compared to existing solution, the proposed method greatly alleviates extra memory space taken and lower energy consumption extends the network lifetime benefiting from the distributed strategy.

Cited References Fulltext