Light trust management for routing in wireless sensor networks

被引:0
作者
Une gestion économe de la confiance pour le routage dans des réseaux de capteurs sans fil
机构
[1] LITIS, MIU, INSA de Rouen, Saint-Étienne du Rouvray
[2] LCIS, Université de Grenoble, Valence
来源
Vercouter, L. (laurent.vercouter@insa-rouen.fr) | 1600年 / Lavoisier卷 / 26期
关键词
Secure routing protocol; Trust management; wireless sensor networks;
D O I
10.3166/RIA.26.543-568
中图分类号
学科分类号
摘要
Communication in Wireless Sensor Networks requires the implementation of decentralized algorithms for routing tasks. The global issue of such algorithms relies directly on the correct behavior of the network nodes. This increases the vulnerability of the system regarding malicious intrusions or local failures. We propose in this article decentralized trust mechanisms in order to detect and avoid deviant nodes. The trust management algorithms follow an original approach as they are suited to a context of limited resources in energy, memory and communication. They are thus suited to be used in multi-agent systems where authentication is not possible, and in which the agents' identity is uncertain. We apply these mechanisms to the MWAC model. © 2012 Lavoisier.
引用
收藏
页码:548 / 568
页数:20
相关论文
共 27 条
[11]  
Handy M., Haase M., Timmermann D., Low energy adaptive clustering hierarchy with deterministic cluster-head selection, Proceedings of the Fourth Ieee Conference on Mobile and Wireless Communications Networks, pp. 368-372, (2002)
[12]  
He X., Gui X., Wei W., A heider-theory based reputation framework for wsn, 10th Ieee International Conference on High Performance Computing and Communications, pp. 635-640, (2008)
[13]  
Jamont J.-P., Occello M., A multiagent tool to simulate hybrid real/virtual embedded agent societies, Proceedings of the Ieee/wic/acm Conference on Intelligent Agent Technology, pp. 501-504, (2009)
[14]  
Jamont J.-P., Occello M., Lagreze A., A multiagent approach to manage communication in wireless instrumentation systems, Measurement, 43, 4, pp. 489-503, (2010)
[15]  
Kifayat K., Merabti M., Shi Q., Llewellyn-Jones D., An efficient algorithm to detect faulty reading in wireless sensor network using the concept of reputation, International Conference on Network and Service Security, pp. 1-5, (2009)
[16]  
Lewis N., Foukia N., Govan D.G., Using trust for key distribution and route selection in wireless sensor networks, Ieee/ifip Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, pp. 787-790, (2008)
[17]  
Liu T., Zhou M.-Z., Implementing a trust-aware routing protocol in wireless sensor nodes, Ieee International Conference on Progress in Informatics and Computing (Pic), pp. 556-559, (2010)
[18]  
Ma B., A novel stereoscopic security architecture with trust management for wireless sensor networks, Proceedings of the 2009 International Conference on Communication Software and Networks, pp. 797-800, (2009)
[19]  
Noergaard T., Embedded Systems Architecture: A Comprehensive Guide for Engineers and Programmers, (2005)
[20]  
Pei Q., Wang L., Yin H., Pang L., Tang H., Layer key management scheme on wireless sensor networks, Proceedings of the Fifth International Conference on Information Assurance and Security, pp. 427-431, (2009)