作者: Tianshu Wang , Kongfa Hu , Xichen Yang , Gongxuan Zhang , Yongli Wang
DOI: 10.1007/S11227-018-2693-Y
关键词: Node (networking) 、 Hash function 、 Computer network 、 Computer science 、 Authentication protocol 、 Efficient energy use 、 Energy consumption 、 Cryptographic protocol 、 Wireless sensor network 、 Authentication 、 Overhead (computing) 、 Data integrity
摘要: Security is crucial in wireless sensor networks (WSNs) since a growing variety of applications require strict security. Cluster-based architecture has an enhancement the system performance WSNs. This article presents trust scheme for cluster-based WSNs, where network time divided into multiple rounds. Each round contains setup phase and steady-state phase. In phase, clusters are formed mutual trusted relationships between cluster nodes established through two proposed authentication protocols called SET-μTESLA (Setup μTESLA) SET-SCHNORR SCHNORR). uses authenticated broadcast μTESLA reduces iterations hash function to improve energy efficiency, while applies lightweight signature SCHNORR scheme. collected environmental or physical data transmitted STEADY-μTESLA protocol (Steady-state μTESLA), which guarantees credibility. The analysis demonstrates that security does well resisting such attacks as confidentiality attacks, integrity compromise node attacks. addition, results calculations simulations show performs better than existing terms communication overhead consumption.