Journal of Software:2014.25(10):2385-2396

(长沙学院 计算机科学与技术系, 湖南 长沙 410022;中南大学 信息科学与工程学院, 湖南 长沙 410083)
One-Way Hash Chain Based Filtering Scheme in Wireless Sensor Networks
LIU Zhi-Xiong,WANG Jiang-Tao,WANG Wei-Ping,LIU Hua-Fu,WANG Jian-Xin,ZHANG Shi-Geng
(Department of Computer Science and Technology, Changsha University, Changsha 410022, China;School of Information Science and Engineering, Central South University, Changsha 410083, China)
Chart / table
Similar Articles
Article :Browse 3050   Download 2873
Received:April 28, 2012    Revised:September 02, 2013
> 中文摘要: 已有传感器网络中,过滤机制只能在转发过程中过滤虚假数据而无法过滤重复数据,且无法防范协同攻击.提出了一种基于单向哈希链的过滤方案HFS.在HFS中,节点在部署后将密钥和初始哈希值预分发给部分中间节点存储,每个数据包附带t个MAC和新鲜哈希值,转发节点同时对数据包中检测节点之间相对位置关系的合法性、MAC和哈希值的正确性以及哈希值的新鲜性进行验证.理论分析及仿真实验结果表明,HFS可同时过滤传感器网络中的虚假数据和重复数据,并能有效对抗协同攻击.
Abstract:Existing filtering schemes in wireless sensor networks can only filter out false reports but not the replayed reports during forwarding. Furthermore, they can not resist cooperative attacks. In this article, a one-way hash chain based filtering scheme (HFS) is presented. In HFS, each node distributes its key and initial hash value to some other nodes after deployment. When a report is generated for an observed event, it carries the MACs and fresh hash values from t detecting nodes. Each forwarding node validates the legitimacy of the relative position of the detecting nodes carried in the report, the correctness of the MACs and hash values, and the freshness of these hash values. Analysis and simulation results show that HFS can not only filter out false reports and replayed reports simultaneously, but also resist collaborative attacks efficiently.
文章编号:     中图分类号:    文献标志码:
基金项目:国家自然科学基金(60873265,61379117);教育部新世纪优秀人才计划(NCET-10-0798);湖南省教育厅科学研究重点项目(13A114) 国家自然科学基金(60873265,61379117);教育部新世纪优秀人才计划(NCET-10-0798);湖南省教育厅科学研究重点项目(13A114)
Foundation items:
Reference text:


LIU Zhi-Xiong,WANG Jiang-Tao,WANG Wei-Ping,LIU Hua-Fu,WANG Jian-Xin,ZHANG Shi-Geng.One-Way Hash Chain Based Filtering Scheme in Wireless Sensor Networks.Journal of Software,2014,25(10):2385-2396