Skip to main content

Data-Centric Trust Framework for High Integrity Wireless Sensor Networks

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6104))

Included in the following conference series:

  • 1681 Accesses

Abstract

Traditional wireless sensor networks (WSN) are entity-centric systems making Sybil attacks, collusion attacks, false data injection attacks etc. very effective attacks. These attacks are critical security threat to WSN. Although there are many security solutions to these attacks, such as cryptography, reputation, authentic consensus, none of them can well defense all these attacks respectively. In this paper, we address this challenge by combining classical security solutions and extending the traditional entity-centric trust to data-centric trust via Dempster-Shafer Theory (DST) and a new method: Proof-of-Reputation-Relevance (PoRR). Our data-centric trust framework gives a whole solution for those attacks. It is realized by our PoRR accomplished by collecting reputation weighted authentic consensus from witness nodes in a cooperative way. Event reports from attacks who fail to provide right PoRR are discarded or given low trust levels. Our simulation results show that our scheme is highly resilient to attackers and converges stably to the correct decision.

This work is partially funded by NFSC project the Research of Data-Centric Security Mechanism in Wireless Sensor Networks (NO.60873239). NSFC: National Natural Science Foundation of China.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Intanagonwiwat, C., Govindan, R.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transactions in Networking (2003)

    Google Scholar 

  2. Perrig, A., Szewczyk, R.: SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking (2001)

    Google Scholar 

  3. Deng, J., Han, R., Mishra, S.: A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 349–364. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Karlof, C., Sastry, N., Wagner, D.: TinySec: Link Layer Encryption for Tiny Devices. In: ACM SenSys (2004)

    Google Scholar 

  5. Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (2004)

    Google Scholar 

  6. Cao, Z., Kong, J., Lee, U.: Proof-of-Relevance: Filtering False Data Via Authentic Consensus in Vehicle Ad-hoc Networks. In: INFOCOM MOVE Workshop (April 2008)

    Google Scholar 

  7. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)

    MATH  Google Scholar 

  8. Raya, M., Papadimitratos, P., Gligor, V.D.: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In: Infocom (2008)

    Google Scholar 

  9. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. In: Proceedings of Infocom (2004)

    Google Scholar 

  10. Zhu, S., Setia, S., Jajodia, S.: An Interleaved Hop-by-hop Authentication Scheme for Filtering False Data Injection in Sensor Network. In: Proceedings of IEEE Symposium on Security and Privacy (2004)

    Google Scholar 

  11. Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (2001)

    Google Scholar 

  12. Jøsang, A.: The Beta Reputation System. In: ACM International Conference Proceeding Series (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, M., Hu, J., Gui, N. (2010). Data-Centric Trust Framework for High Integrity Wireless Sensor Networks. In: Bellavista, P., Chang, RS., Chao, HC., Lin, SF., Sloot, P.M.A. (eds) Advances in Grid and Pervasive Computing. GPC 2010. Lecture Notes in Computer Science, vol 6104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13067-0_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13067-0_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13066-3

  • Online ISBN: 978-3-642-13067-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics