Reasoning about trust and reputation system to coordinate wireless sensor networks

被引:0
|
作者
机构
[1] Computer School Yangtze University
来源
Yang, Q. | 1600年 / Asian Network for Scientific Information卷 / 12期
关键词
Intrusion detection; Reputation; Turst management; Wireless sensor networks;
D O I
10.3923/itj.2013.6686.6693
中图分类号
学科分类号
摘要
Due to the nature of the WSN and the extreme resource constraints of sensor devices, providing secure, efficient and user-friendly trust initialization is a challenging task. This study identify a coordination communication model which characterizes trust groups in order to promote safe interactions in the ubiquitous environment. Through the proposed TRSCM (Trust and Reputation System for Communication Management), a group of sensor devices that have no pre-shared secrets, establish initial trust by generating various shared secret keys out of an unauthenticated channel. The dynamics of trust group creation, evolution and termination are described, in terms of the history of interactions of the device and on the ontology used to encode the context of trust. After the reasoning the security of the proposed protocols, we implement the middleware on a network testbed and report performance evaluation results. ©2013 Asian Network for Scientific Information.
引用
收藏
页码:6686 / 6693
页数:7
相关论文
共 50 条
  • [21] Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks
    Gheorghe, Laura
    Rughinis, Razvan
    Tataroiu, Razvan
    2013 ROEDUNET INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH, 12TH EDITION, 2013,
  • [22] LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
    Li, Xiaoyong
    Zhou, Feng
    Du, Junping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 924 - 935
  • [23] Trust Aware Directed Diffusion Scheme for Wireless Sensor Networks
    Kundu, Kaustav
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    Chattopadhyay, Samiran
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 385 - 391
  • [24] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [25] Utilising Acknowledge for the Trust in Wireless Sensor Networks
    Alrahhal, Hosam
    Jamous, Razan
    Ramadan, Rabie
    Alayba, Abdulaziz M.
    Yadav, Kusum
    APPLIED SCIENCES-BASEL, 2022, 12 (04):
  • [27] Functional reputation based reliable data aggregation and transmission for wireless sensor networks
    Ozdemir, Suat
    COMPUTER COMMUNICATIONS, 2008, 31 (17) : 3941 - 3953
  • [28] Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps
    Bankovic, Zorana
    Moya, Jose M.
    Araujo, Alvaro
    Fraga, David
    Carlos Vallejo, Juan
    de Goyeneche, Juan-Mariano
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2010, 17 (02) : 87 - 102
  • [29] Coordinate Based Routing Algorithm for Wireless Sensor Networks
    Karna, Anil Kumar
    2012 Third IEEE and IFIP South Central Asian Himalayas Regional International Conference on Internet (AH-ICI 2012), 2012,
  • [30] A Reputation-based Routing Protocol for Wireless Sensor Networks
    Adnan, Ali I.
    Hanapi, Zurina M.
    Othman, Mohamed
    Zukarnain, Zuriati A.
    Sadiq, Abubakar
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,