A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

被引:0
作者
Stelios, Yannis [1 ]
Papayanoulas, Nikos [1 ]
Trakadas, Panagiotis [1 ]
Maniatis, Sotiris [1 ]
Leligou, Helen C. [1 ]
Zahariadis, Theodore [1 ]
机构
[1] TEl Chalkis, Dept Elect Engn, Psahna, Greece
来源
MOBILE LIGHTWEIGHT WIRELESS SYSTEMS | 2009年 / 13卷
关键词
Wireless sensor networks; trust management; secure routing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as "routers", forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
引用
收藏
页码:85 / 92
页数:8
相关论文
共 15 条
[1]  
Crosby G.V., 2007, CONS COMM NETW C CCN
[2]  
GHAZALEH NB, 2005, 1 ACM WORKSH QOS SEC
[3]   Security in wireless sensor networks [J].
Giruka, Venkata C. ;
Singhal, Mukesh ;
Royalty, James ;
Varanasi, Srilekha .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01) :1-24
[4]   Trust evaluation model for wireless sensor networks [J].
Hur, J ;
Lee, Y ;
Yoon, H ;
Choi, D ;
Jin, S .
7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, :491-496
[5]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[6]  
Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
[7]  
Karp K., 2000, MOBICOM 2000
[8]  
Lewis N., 2007, IEEE GLOB 2007
[9]  
LI H, 2006, 39 HAW INT C SYST SC
[10]  
MAHONEY G, 2005, 3 ANN C PRIV SEC TRU