Abstract
Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer (2003)
Pirzada, A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. In: Proceedings of the 27th conference on Australasian computer science (2004)
Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communication of the ACM (June 2004)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. NEST (2003)
Yan, Z., Zhang, P., Virtanen, T.: Trust Evaluation Based Security Solution in Ad Hoc Networks. In: NordSec 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems, October 15th-17th (2003)
Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: Proceedings of the 2003 ACM workshop on Wireless security (2003)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks, SenSys 2003 (2003)
Krishnamachari, B., Estrin, D., Wicker, S.: The Impact of Data Aggregation in Wireless Sensor Networks. In: ICDCSW, Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 575–578 (2002)
Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Conference on Computer and Communications Security, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 83–93 (2003)
Doumit, S.S., Agrawal, D.P.: Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks. In: Military Communications Conference, 2003. MILCOM 2003, pp. 609–614. IEEE, Los Alamitos (2003)
Eschenauer, L., Gilgor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press, New York (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkely, California, May 11-14, pp. 197–213 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31, pp. 42–51 (2003)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINE) (September 2002)
Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Workshop on Security and Assurance in Ad hoc Networks (January 2003)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California (May 2004)
Ye, F., Luo, H., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. Proceedings of IEEE INFOCOM (2004)
Wagner, D.: Resilient Aggregation in Sensor Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), October 25 (2004)
Shrivastava, N., Buragohain, C., Agrawal, D., Suri, S.: Medians and Beyond: New Aggregation Techniques for Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 16 (2004)
Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: IPSN 2005, Los Angeles (April 2005)
Ji, X., Zha, H.: Robust Sensor Localization Algorithm in Wireless Ad-hoc Sensor Networks. In: Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 2003) (2003)
Lazos, L., Poovendran, R.: SeRLoc: Secure Range-Independent Localiztion for Wireless Sensor Networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security, pp. 21–30 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hur, J., Lee, Y., Hong, SM., Yoon, H. (2006). Trust Management for Resilient Wireless Sensor Networks. In: Won, D.H., Kim, S. (eds) Information Security and Cryptology - ICISC 2005. ICISC 2005. Lecture Notes in Computer Science, vol 3935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734727_7
Download citation
DOI: https://doi.org/10.1007/11734727_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33354-8
Online ISBN: 978-3-540-33355-5
eBook Packages: Computer ScienceComputer Science (R0)