Browse > Article
http://dx.doi.org/10.6109/jkiice.2010.14.10.2358

A Multi-hash Chain Scheme for Ensure Data Integirty Nodes in Wireless Sensor Network  

Park, Gil-Cheol (한남대학교 공과대학 멀티미디어학부)
Jeong, Yoon-Su (한남대학교 산업기술연구소)
Kim, Yong-Tae (한남대학교 공과대학 멀티미디어학부)
Lee, Sang-Ho (충북대학교 전자정보대학 컴퓨터공학부)
Abstract
Recently, In the wireless sensor network, a study which guarantees integrity of not only data gathered from sensor node but also energy consumption of it is now going on. However, the existing study cannot guarantee data integrity and overhead of cluster head which merges data from sensor node. This paper proposes multi-path hash chain technique which guarantees integrity of merged data and reduces overhead of cluster head when cluster head merges with data transmitted from sensor node. The proposed technique forms multi-hash chain dividing main-path and assistance-path to guarantee data integrity of cluster head, when merges data. The assistance-path, which is used when main-path is not, supports integrity of sensor node while minimizing overhead of cluster head when sensor node is authenticate.
Keywords
wireless sensor network; multi-hash chain; data integrity;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D. Xiao, X. F. Liao, and S. J. Deng, "One-way hash function construction based on the chaotic map with changeable-parameter", Chaos, Solitons & Fractals, 2005, vol.24, no. 1, pp. 65-71. 2005.   DOI   ScienceOn
2 정윤수, 김용태, 박길철, 이상호, "WSN의 확장성과 에너지 효율성을 보장하는 라우팅 프로토콜", 한국컴퓨터정보학회 논문지, pp. 105-113, 2008년 7월.   과학기술학회마을
3 정윤수, 김용태, 박길철, 이상호, "노드간 에너지 소비를 효율적으로 분산시킨 PRML 메커니즘", 한국해양정보통신학회 논문지, pp. 774-784, 2009년 4월.   과학기술학회마을
4 L. Lamport, "Password authentication with insecure communication", Communicatios of the ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.   DOI   ScienceOn
5 S. Peter, K. Piotrowski, P. Langendoerfer, "On Concealed Data Aggregation for Wireless Sensor Networks", Consumer Communications and Networking Conference, 2007.
6 J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor networks", International Conference on Communication(ICC2005), vol. 5, pp. 3044-3049, 2005.
7 J. D. Ferrer, "A Provably Secure Additive and Multiplicative Privacy Homomorphism", In Information Security Conference, LNCS 2433, pp. 471-483, 2002.
8 E. Mykletun, J. Girao, and D. Westhoff, "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks", International Conference on Communications(ICC2006), vol. 5, p. 2288-2295, 2006.
9 N. Xu, S. Rangwala, K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, D. Estrin, "A Wireless Sensor Network for Structural Monitoring," In Proceedings of the ACM Conference on Embedded Networked Sensor Systems, November 2004.