Skip to main content

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Abstract

Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their advantages with respect to classic sensor networks. However, nodes in a WSN cooperate and this exposes them to several security threats. Trust-based systems constitute an established solution to ensure security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer. We show how such attacks are tolerated with low overhead in comparison to unprotected systems. Preliminary experimental results are presented confirming the validity of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Afzaal, M., Di Sarno, C., Coppolino, L., D’Antonio, S., Romano, L.: A resilient architecture for forensic storage of events in critical infrastructures. In: 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE), pp. 48–55 (October 2012)

    Google Scholar 

  2. Bondavalli, A., Ceccarelli, A., Falai, L., Vadursi, M.: Foundations of measurement theory applied to the evaluation of dependability attributes. In: 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, pp. 522–533 (2007)

    Google Scholar 

  3. Coppolino, L., D’Antonio, S., Garofalo, A., Romano, L.: Applying data mining techniques to intrusion detection in wireless sensor networks. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 247–254 (2013)

    Google Scholar 

  4. Coppolino, L., Romano, L., Bondavalli, A., Daidone, A.: A hidden markov model based intrusion detection system for wireless sensor networks. Int. J. Crit. Comput.-Based Syst. 3(3), 210–228 (2012)

    Article  Google Scholar 

  5. Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: The collection tree protocol (ctp) (2006)

    Google Scholar 

  6. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw. 4(3), 15:1–15:37 (2008)

    Google Scholar 

  7. Garofalo, A., Di Sarno, C., Formicola, V.: Enhancing intrusion detection in wireless sensor networks through decision trees. In: Vieira, M., Cunha, J.C. (eds.) EWDC 2013. LNCS, vol. 7869, pp. 1–15. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First 2003 IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

    Google Scholar 

  9. Li, Z., Gong, G.: A survey on security in wireless sensor networks. Department of Electrical and Computer Engineering. University of Waterloo, Canada, pp. 2008–2020 (2011)

    Google Scholar 

  10. Maarouf, I., Baroudi, U., Naseer, A.: Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications 3(5), 846–858 (2009)

    Article  Google Scholar 

  11. Min, W., Kim, K.: Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks. In: 2014 International Conference on Information Networking (ICOIN), pp. 131–135 (2014)

    Google Scholar 

  12. National Science Foundation, Planète group: ns-3 (2012)

    Google Scholar 

  13. Perkins, C., Belding-Royer, E., Das, S.: et al.: Rfc 3561-ad hoc on-demand distance vector (aodv) routing. Internet RFCs, pp. 1–38 (2003)

    Google Scholar 

  14. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In: Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994, pp. 234–244. ACM, New York (1994)

    Chapter  Google Scholar 

  15. Rezgui, A., Eltoweissy, M.: μRACER: A reliable adaptive service-driven efficient routing protocol suite for sensor-actuator networks. IEEE Transactions on Parallel and Distributed Systems 20(5), 607–622 (2009)

    Article  Google Scholar 

  16. Schillo, M., Funk, P., Stadtwald, I., Rovatsos, M.: Using trust for detecting deceitful agents in artificial societies (2000)

    Google Scholar 

  17. Srinivasan, A., Wu, J.: Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks 2(3), 239–253 (2009)

    Article  Google Scholar 

  18. Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 463–469 (2004)

    Google Scholar 

  19. Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35(3), 867–880 (2012); special Issue on Trusted Computing and Communications

    Google Scholar 

  20. Zhan, G., Shi, W., Deng, J.: Design and implementation of tarf: A trust-aware routing framework for wsns. IEEE Transactions on Dependable and Secure Computing 9(2), 184–197 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Buccafurri, F. et al. (2014). Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks. In: Bondavalli, A., Di Giandomenico, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8666. Springer, Cham. https://doi.org/10.1007/978-3-319-10506-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10506-2_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10505-5

  • Online ISBN: 978-3-319-10506-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics