Trust Models for Sensor Networks

被引:0
作者
Zahariadis, T. [1 ]
Ladis, E. [2 ]
Leligou, H. C. [1 ]
Trakadas, P. [1 ]
Tselikis, C. [2 ]
Papadopoulos, K. [1 ]
机构
[1] TEI Chalkis, Dept Elect Engn, Psahna, Greece
[2] Hellen Aviat Ind, Schimatari 32009, Greece
来源
PROCEEDINGS ELMAR-2008, VOLS 1 AND 2 | 2008年
关键词
Sensor Networks; Routing; Trust Model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The range of applications of wireless sensor networks is so wide that it tends to invade our every-day life. In the future, a sensor network will surveil our health, our home, the roads we follow, the office or the industry we work in, or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attack is already very long and will impede the deployment of these solutions, if not efficiently addressed In this paper, we focus on the security threats against routing, which is a basic networking service, required for any sensor network communication. Preventing the integrity and data freshness of the exchanged packets is a requirement but is not enough to secure the routing procedure. It is required to set-up a trust management scheme which allows the nodes to select trusted paths rather than secure routes in the network by observing the sincerity in participation by other nodes. A trust management system can be useful for detecting a node which is not behaving as expected (either faulty or maliciously). Current trends in trusted routing for ad-hoc networks are reviewed, followed by comments on their applicability in sensor network and guidelines for trust model design for new sensor applications.
引用
收藏
页码:511 / +
页数:2
相关论文
共 11 条
  • [1] AMIR A, ICON2007
  • [2] [Anonymous], P IEEE INT C NETW PR
  • [3] Buchegger S., 2002, P 3 ACM INT S MOB AD, P226
  • [4] CROSBY GV, 2007, CONS COMM NETW C 200
  • [5] Johnson D, P 8 ANN INT C MOB CO, P12
  • [6] LIU ZY, P 10 IEEE INT WORKSH
  • [7] Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955
  • [8] MICHIARDI P, 2002, P IFIP TC6 TC11 6 JO, V228, P1071
  • [9] SPINS: Security protocols for sensor networks
    Perrig, A
    Szewczyk, R
    Tygar, JD
    Wen, V
    Culler, DE
    [J]. WIRELESS NETWORKS, 2002, 8 (05) : 521 - 534
  • [10] Incorporating trust and reputation in the DSR protocol for dependable routing
    Pirzada, Asad Amir
    Datta, Amitava
    McDonald, Chris
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2806 - 2821