TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks

被引:33
作者
Mali, Goutam [1 ]
Misra, Sudip [1 ]
机构
[1] Indian Inst Technol Kharagpur, Sch Informat Technol, Kharagpur, W Bengal, India
关键词
Wireless multimedia sensor networks; node replication attack; trust; received signal strength; AD-HOC NETWORKS; SECURITY; LIGHTWEIGHT;
D O I
10.1109/TC.2015.2456026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed topology management scheme in wireless multimedia sensor networks (WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains connectivity between camera sensor (CS) nodes. However, the deployment of WMSNs in unattended environments makes the nodes vulnerable to security attacks. Hence, security issues should be considered, along with topology management, in WMSNs. In this work, we propose a trust-based distributed topology management scheme, named TRAST, for use in WMSNs. TRASTexploits the received signal strength of the control packets, which are then used to construct the distributed topology. In a non-secure distributed topology, the use of trust helps in providing coverage of an event, and maintaining connectivity, even in the presence of malicious attacks. The proposed topology management scheme achieves higher average coverage ratio and average packet delivery ratio than those corresponding to the LDTS and T-Must schemes, in the presence of malicious attacks.
引用
收藏
页码:1978 / 1991
页数:14
相关论文
共 28 条
[1]  
Abdul-Rahman A., 1998, Proceedings of the 1997 Workshop on New Security Paradigms, P48
[2]   A survey on wireless multimedia sensor networks [J].
Akyildiz, Ian F. ;
Melodia, Tommaso ;
Chowdhury, Kaushik R. .
COMPUTER NETWORKS, 2007, 51 (04) :921-960
[3]  
[Anonymous], 2004, P IEEE PAR DISTR PRO
[4]  
[Anonymous], 1996, WIRELESS COMMUNICATI
[5]  
[Anonymous], P 2 ACM MOB AD HOC N
[6]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[7]  
[Anonymous], P ACM SEC PAR WORKSH
[8]  
[Anonymous], 1976, DEMPSTERS RULE COMBI, DOI DOI 10.2307/J.CTV10VM1QB.7
[9]   Security Games for Node Localization through Verifiable Multilateration [J].
Basilico, Nicola ;
Gatti, Nicola ;
Monga, Mattia ;
Sicari, Sabrina .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (01) :72-85
[10]   Reliable event-detection in wireless visual sensor networks through scalar collaboration and game-theoretic consideration [J].
Czarlinska, Alexandra ;
Kundur, Deepa .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (05) :675-690