Node-Level Trust Evaluation in Wireless Sensor Networks

被引:29
作者
Desai, S. Sundeep [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
Security; trust; trust evaluation algorithms; cryptography; node-level security; node-memory integrity; AD HOC; MANAGEMENT; SECURITY; ATTACKS; SYSTEMS; SERVICE;
D O I
10.1109/TIFS.2019.2894027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cryptographic methods do not cater to the limitations of wireless sensor networks (WSNs) primarily concerning code size, processing time, and power consumption. The study in this paper enumerates the security primitives in WSNs and accentuates the strength of trust evaluation as a security solution within the WSN precincts. This paper proposes a trust evaluation methodology that evaluates a node-level trust by using an internal resource of a node. It is a completely mediating technique which is independent of network topology and second-hand information. The challenge response method enables a node to evaluate trust for itself; and with its peer-node/s with which it intends to interact using the proposed self-scrutiny and self-attestation algorithms, respectively. The efficacy of the proposed software-based methodology and the algorithms is demonstrated with the actual implementation on sensor nodes. The ability to counter attack-scenarios along with the analysis exhibits the merit of the proposed work. The average values of the observed results illustrate the consistency and robust performance of the proposed trust evaluation algorithms.
引用
收藏
页码:2139 / 2152
页数:14
相关论文
共 57 条
[1]   Hybrid trust and reputation management for sensor networks [J].
Aivaloglou, Efthimia ;
Gritzalis, Stefanos .
WIRELESS NETWORKS, 2010, 16 (05) :1493-1510
[2]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[3]  
[Anonymous], 2009, WILEY SERIES COMMUNI
[4]  
[Anonymous], 3548 RZ IBM RES GMBH
[5]  
[Anonymous], 2006, P 7 INT C MOB DAT MA
[6]  
[Anonymous], 2005, P 26 IEEE INT REAL T
[7]  
[Anonymous], 2015, INT C NETWORK SYSTEM
[8]  
[Anonymous], COMPUT COMMUN
[9]  
[Anonymous], J NETWORK SECURITY
[10]  
Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836