Abstract
Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their advantages with respect to classic sensor networks. However, nodes in a WSN cooperate and this exposes them to several security threats. Trust-based systems constitute an established solution to ensure security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer. We show how such attacks are tolerated with low overhead in comparison to unprotected systems. Preliminary experimental results are presented confirming the validity of the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Afzaal, M., Di Sarno, C., Coppolino, L., D’Antonio, S., Romano, L.: A resilient architecture for forensic storage of events in critical infrastructures. In: 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE), pp. 48–55 (October 2012)
Bondavalli, A., Ceccarelli, A., Falai, L., Vadursi, M.: Foundations of measurement theory applied to the evaluation of dependability attributes. In: 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, pp. 522–533 (2007)
Coppolino, L., D’Antonio, S., Garofalo, A., Romano, L.: Applying data mining techniques to intrusion detection in wireless sensor networks. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 247–254 (2013)
Coppolino, L., Romano, L., Bondavalli, A., Daidone, A.: A hidden markov model based intrusion detection system for wireless sensor networks. Int. J. Crit. Comput.-Based Syst. 3(3), 210–228 (2012)
Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: The collection tree protocol (ctp) (2006)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw. 4(3), 15:1–15:37 (2008)
Garofalo, A., Di Sarno, C., Formicola, V.: Enhancing intrusion detection in wireless sensor networks through decision trees. In: Vieira, M., Cunha, J.C. (eds.) EWDC 2013. LNCS, vol. 7869, pp. 1–15. Springer, Heidelberg (2013)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First 2003 IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)
Li, Z., Gong, G.: A survey on security in wireless sensor networks. Department of Electrical and Computer Engineering. University of Waterloo, Canada, pp. 2008–2020 (2011)
Maarouf, I., Baroudi, U., Naseer, A.: Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications 3(5), 846–858 (2009)
Min, W., Kim, K.: Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks. In: 2014 International Conference on Information Networking (ICOIN), pp. 131–135 (2014)
National Science Foundation, Planète group: ns-3 (2012)
Perkins, C., Belding-Royer, E., Das, S.: et al.: Rfc 3561-ad hoc on-demand distance vector (aodv) routing. Internet RFCs, pp. 1–38 (2003)
Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In: Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994, pp. 234–244. ACM, New York (1994)
Rezgui, A., Eltoweissy, M.: μRACER: A reliable adaptive service-driven efficient routing protocol suite for sensor-actuator networks. IEEE Transactions on Parallel and Distributed Systems 20(5), 607–622 (2009)
Schillo, M., Funk, P., Stadtwald, I., Rovatsos, M.: Using trust for detecting deceitful agents in artificial societies (2000)
Srinivasan, A., Wu, J.: Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks 2(3), 239–253 (2009)
Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 463–469 (2004)
Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35(3), 867–880 (2012); special Issue on Trusted Computing and Communications
Zhan, G., Shi, W., Deng, J.: Design and implementation of tarf: A trust-aware routing framework for wsns. IEEE Transactions on Dependable and Secure Computing 9(2), 184–197 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Buccafurri, F. et al. (2014). Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks. In: Bondavalli, A., Di Giandomenico, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8666. Springer, Cham. https://doi.org/10.1007/978-3-319-10506-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-10506-2_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10505-5
Online ISBN: 978-3-319-10506-2
eBook Packages: Computer ScienceComputer Science (R0)