In wireless sensor networks (WSNs), although there are many existed schemes for the local eavesdropper. However, a global eavesdropper who is well-equipped, highly motivated and has the ability to compromise node can make those method invalid, so that those existing techniques can't be against such attacks. In this paper, we proposed the Hash Periodic Collection technology (HPCT) through applying the hash encryption to the PCT for the purpose of protecting the location privacy of the source node under the global eavesdropping attacks and compromised node attacks. The experiment showed that the Hash Periodic Collection technology (HPCT) we introduced is better than PCT, and the HPCT dramatically increased the security and safety time of the source location privacy.
Abstract. Identity authentication is a crucial security issue in wireless sensor networks, because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attacks. We propose a new identity authentication scheme based on the behaviors of node in wireless sensor networks. Our scheme which depends on trust mechanism can resist the insider attacks effectively. With the total trust value integrated with direct trust value, recommendation trust value and history trust value of nodes, we can verify identity of nodes. Experiments indicate that our scheme is ideal to enhance the solution for identity authentication of nodes. Moreover, it can against the insider attacks effectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.