Abstract
Traditional wireless sensor networks (WSN) are entity-centric systems making Sybil attacks, collusion attacks, false data injection attacks etc. very effective attacks. These attacks are critical security threat to WSN. Although there are many security solutions to these attacks, such as cryptography, reputation, authentic consensus, none of them can well defense all these attacks respectively. In this paper, we address this challenge by combining classical security solutions and extending the traditional entity-centric trust to data-centric trust via Dempster-Shafer Theory (DST) and a new method: Proof-of-Reputation-Relevance (PoRR). Our data-centric trust framework gives a whole solution for those attacks. It is realized by our PoRR accomplished by collecting reputation weighted authentic consensus from witness nodes in a cooperative way. Event reports from attacks who fail to provide right PoRR are discarded or given low trust levels. Our simulation results show that our scheme is highly resilient to attackers and converges stably to the correct decision.
This work is partially funded by NFSC project the Research of Data-Centric Security Mechanism in Wireless Sensor Networks (NO.60873239). NSFC: National Natural Science Foundation of China.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Intanagonwiwat, C., Govindan, R.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transactions in Networking (2003)
Perrig, A., Szewczyk, R.: SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking (2001)
Deng, J., Han, R., Mishra, S.: A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 349–364. Springer, Heidelberg (2003)
Karlof, C., Sastry, N., Wagner, D.: TinySec: Link Layer Encryption for Tiny Devices. In: ACM SenSys (2004)
Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (2004)
Cao, Z., Kong, J., Lee, U.: Proof-of-Relevance: Filtering False Data Via Authentic Consensus in Vehicle Ad-hoc Networks. In: INFOCOM MOVE Workshop (April 2008)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Raya, M., Papadimitratos, P., Gligor, V.D.: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In: Infocom (2008)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. In: Proceedings of Infocom (2004)
Zhu, S., Setia, S., Jajodia, S.: An Interleaved Hop-by-hop Authentication Scheme for Filtering False Data Injection in Sensor Network. In: Proceedings of IEEE Symposium on Security and Privacy (2004)
Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (2001)
Jøsang, A.: The Beta Reputation System. In: ACM International Conference Proceeding Series (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, M., Hu, J., Gui, N. (2010). Data-Centric Trust Framework for High Integrity Wireless Sensor Networks. In: Bellavista, P., Chang, RS., Chao, HC., Lin, SF., Sloot, P.M.A. (eds) Advances in Grid and Pervasive Computing. GPC 2010. Lecture Notes in Computer Science, vol 6104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13067-0_61
Download citation
DOI: https://doi.org/10.1007/978-3-642-13067-0_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13066-3
Online ISBN: 978-3-642-13067-0
eBook Packages: Computer ScienceComputer Science (R0)