Skip to main content

Trust Management for Resilient Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3935))

Abstract

Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer (2003)

    Google Scholar 

  2. Pirzada, A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. In: Proceedings of the 27th conference on Australasian computer science (2004)

    Google Scholar 

  3. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communication of the ACM (June 2004)

    Google Scholar 

  4. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. NEST (2003)

    Google Scholar 

  5. Yan, Z., Zhang, P., Virtanen, T.: Trust Evaluation Based Security Solution in Ad Hoc Networks. In: NordSec 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems, October 15th-17th (2003)

    Google Scholar 

  6. Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: Proceedings of the 2003 ACM workshop on Wireless security (2003)

    Google Scholar 

  7. Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks, SenSys 2003 (2003)

    Google Scholar 

  8. Krishnamachari, B., Estrin, D., Wicker, S.: The Impact of Data Aggregation in Wireless Sensor Networks. In: ICDCSW, Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 575–578 (2002)

    Google Scholar 

  9. Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Conference on Computer and Communications Security, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 83–93 (2003)

    Google Scholar 

  10. Doumit, S.S., Agrawal, D.P.: Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks. In: Military Communications Conference, 2003. MILCOM 2003, pp. 609–614. IEEE, Los Alamitos (2003)

    Chapter  Google Scholar 

  11. Eschenauer, L., Gilgor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press, New York (2002)

    Google Scholar 

  12. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkely, California, May 11-14, pp. 197–213 (2003)

    Google Scholar 

  13. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31, pp. 42–51 (2003)

    Google Scholar 

  14. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINE) (September 2002)

    Google Scholar 

  15. Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Workshop on Security and Assurance in Ad hoc Networks (January 2003)

    Google Scholar 

  16. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California (May 2004)

    Google Scholar 

  17. Ye, F., Luo, H., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. Proceedings of IEEE INFOCOM (2004)

    Google Scholar 

  18. Wagner, D.: Resilient Aggregation in Sensor Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), October 25 (2004)

    Google Scholar 

  19. Shrivastava, N., Buragohain, C., Agrawal, D., Suri, S.: Medians and Beyond: New Aggregation Techniques for Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 16 (2004)

    Google Scholar 

  20. Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: IPSN 2005, Los Angeles (April 2005)

    Google Scholar 

  21. Ji, X., Zha, H.: Robust Sensor Localization Algorithm in Wireless Ad-hoc Sensor Networks. In: Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 2003) (2003)

    Google Scholar 

  22. Lazos, L., Poovendran, R.: SeRLoc: Secure Range-Independent Localiztion for Wireless Sensor Networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security, pp. 21–30 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hur, J., Lee, Y., Hong, SM., Yoon, H. (2006). Trust Management for Resilient Wireless Sensor Networks. In: Won, D.H., Kim, S. (eds) Information Security and Cryptology - ICISC 2005. ICISC 2005. Lecture Notes in Computer Science, vol 3935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734727_7

Download citation

  • DOI: https://doi.org/10.1007/11734727_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33354-8

  • Online ISBN: 978-3-540-33355-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics