Abstract
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Giruka, V.C., Singhal, M., Royalty, J., Varanasi, S.: Security in wireless sensor networks. Wireless Comm. Mob. Comput. 8, 1–24 (2008)
Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Comm., 85–91 (2007)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: IEEE Int. Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)
Li, H., Singhal, M.: A Secure Routing Protocol for Wireless ad hoc Networks. In: 39th Hawaii International Conf. on system Sciences (2006)
Rezgui, A., Eltoweissy, M.: TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks. In: IEEE Int. Conf. on Mobile Adhoc and Sensor Systems (2007)
Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: Trust evaluation model for wireless sensor networks. In: Advanced Comm. Tech. Conference, ICACT 2005, pp. 491–496 (2005)
Crosby, G.V., Pissinou, N.: Cluster-based Reputation and Trust for Wireless Sensor Networks. In: Consumer Communications and Networking Conference, CCNC (2007)
Lewis, N., Foukia, N.: Using Trust for Key Distribution and Route Selection in Wireless Sensor Networks. In: IEEE Globecom 2007 (2007)
Mahoney, G., Myrvold, W., Shoja, G.C.: Generic Reliability Trust Model. In: 3rd Annual Conference on Privacy, Security and Trust (2005)
Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. In: IEEE Int. Conf. on Performance, Computing, and Communications (2004)
Ghazaleh, N., Kang, K.D., Liu, K.: Towards Resilient Geographic Routing in Wireless Sensor Networks. In: 1st ACM Workshop on QoS and Security for Wireless and Mobile Networks (2005)
Pirzada, A., McDonald, C.: Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Comm. 37, 139–163 (2006)
Marias, G., Tsetsos, V., Sekkas, O., Georgiadis, P.: Performance evaluation of a self-evolving trust building framework. In: 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)
Sun, Y.L., Han, Z., Ray Liu, K.J.: Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine 25, 112–119 (2008)
Karp, K., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for WirelessNetworks. In: MobiCom 2000 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Stelios, Y., Papayanoulas, N., Trakadas, P., Maniatis, S., Leligou, H.C., Zahariadis, T. (2009). A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks. In: Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S. (eds) Mobile Lightweight Wireless Systems. Mobilight 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 13. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03819-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-03819-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03818-1
Online ISBN: 978-3-642-03819-8
eBook Packages: Computer ScienceComputer Science (R0)