Skip to main content

Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks

  • Conference paper
Trusted Systems (INTRUST 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7222))

Included in the following conference series:

  • 926 Accesses

Abstract

Wireless sensor networks are vulnerable to a large number of security threats and malicious attacks. The traditional security approaches from encryption and authentication are insufficient to defend the insider attacks which are launched inside of the WSNs and bypass the crypto-based defence. Trust management has been recently suggested as one of the effective security mechanisms for distributed systems, and is a promising new approach to solve the security challenges in wireless sensor networks. However, to the best of our knowledge, it is still a challenge to establish an integrated trust management mechanism with comprehensive security analysis. In this paper, we consider the clustered wireless sensor network in which the cluster head is in charge of the trust management of other sensor nodes. We propose a novel, integrated trust management mechanism for the cluster wireless sensor networks, and analyze the optimal decision making policy by using game theory. First, the upstream/downstream joint monitoring scheme is implemented to securely and efficiently observe the behavior of the insider nodes. Then based on the monitoring results, the local trustworthiness and global trust worthiness are derived based on the trust exchange and the trust computation. Finally, by game theoretic analysis of the security interaction between the attacker and the network, the optimal trust policy can be made based on min-max rule, and the optimal utility of the WSNs can be guaranteed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2292–2330 (2008)

    Article  Google Scholar 

  2. Perrig, A., Stankovich, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  3. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 17th IEEE Symp. on Security and Privacy, pp. 164–173. IEEE Computer Society (1996)

    Google Scholar 

  4. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst., 618–644 (March 2005)

    Google Scholar 

  5. Josang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006), Darlinghurst, Australia, vol. 48, pp. 85–94 (2006)

    Google Scholar 

  6. Gollmann, D.: From Access Control to Trust Management, and Back – A Petition. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.) IFIPTM 2011. IFIP AICT, vol. 358, pp. 1–8. Springer, Heidelberg (2011)

    Google Scholar 

  7. Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of ACM Security for Ad-hoc and Sensor Networks, SASN (2004)

    Google Scholar 

  8. Shaikh, R.A., Jameel, H., Brian, J., Lee, H., Lee, S., Song, Y.J.: Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 1698–1712 (November 2009)

    Google Scholar 

  9. Momani, M., Challa, S., Alhmouz, R.: Can we trust trusted nodes in wireless sensor networks? In: International Conference on Computer and Communication Engineering (ICCCE 2008) (May 2008)

    Google Scholar 

  10. Lin, C., Vijay, V.: A Hybrid Trust Model for Enhancing Security in Distributed Systems. In: The Second International Conference on Availability, Reliability and Security, pp. 35–42 (2007)

    Google Scholar 

  11. Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5) (July 2010)

    Google Scholar 

  12. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case. IEEE/ACM Transactions on Networking 16(1), 63–76 (2008)

    Article  Google Scholar 

  13. Gómez, F., Girao, J., Pérez, G.M.: TRIMS, a privacy-aware trust and reputation model for identity management systems. Comput. Netw. 54(16) (November 2010)

    Google Scholar 

  14. Shila, D.M., Cheng, Y.: Mitigating selective forwarding attacks with a Channel Aware Approach in WMNs. IEEE Transaction on Wireless Communications (May 2010)

    Google Scholar 

  15. Ellison, C.M., Franz, B., Rivest, R., Thomas, B.M., Ylonen, T.: Simple public key infrastructure certificate theory. IETF RFC 2693 (1999)

    Google Scholar 

  16. Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V.: dRBAC: Distributed role-based access control for dynamic coalition environments. Technical Report, TR 2001-819, New York University (2001)

    Google Scholar 

  17. Velloso, B., Laufer, P., Duarte, O., Pujolle, G.: A Trust Model Robust to Slander Attacks in Ad Hoc Networks. In: Proceedings of 17th International Conference on Computer Communications and Networks (ICCCN 2008), pp. 1–6 (2008)

    Google Scholar 

  18. Lynch, D.M.: Securing against insider attacks. Information Security Systems 15(5), 39–47 (2006)

    Article  Google Scholar 

  19. Kantzavelou, I., Katsikas, S.: A game-based intrusion detection mechanism to confront internal attackers. Computers Security 29(8), 859–874 (2010)

    Article  Google Scholar 

  20. Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks. Wiley-Interscience (2007) ISBN:0471756881

    Google Scholar 

  21. Bace, R.G.: Intrusion detection. Macmillan Publishing Co., Inc., Indianapolis (2001)

    Google Scholar 

  22. Xue, X.Y., Leneutre, J., BenOthman, J.: A Trust-based Routing Prtocol for Ad Hoc Networks. In: Proceeding of Mobile and Wireless Communications Networks, pp. 251–262 (October 2004)

    Google Scholar 

  23. Royer, E.M., Toh, C.K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 46–55 (April 1999)

    Google Scholar 

  24. Bao, F., Chen, I.-R., Chang, M., Cho, J.: Hierarchical trust management for wireless sensor networks and its application to trust-based routing. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1732–1738. New York (2011)

    Google Scholar 

  25. Scott, K., Bambos, N.: Routing and channel assignment for low power transmission in PCS. In: Proc. IEEE ICUPC 1996, vol. 2, pp. 498–502 (1996)

    Google Scholar 

  26. Singh, S., Woo, M., Raghavendra, C.S.: Power-aware routing in mobile ad hoc networks. In: Proc. ACM MobiCom 1998, pp. 181–190 (1998)

    Google Scholar 

  27. Toh, C.-K.: Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks. IEEE Communications Magazine, 138–147 (June 2001)

    Google Scholar 

  28. Li, H., Singhal, M.: Trust Management in Distributed Systems. Computer, 45–53 (February 2007)

    Google Scholar 

  29. Xiong, L., Liu, L.: Building Trust in Decentralized Peerto- Peer Electronic Communities. In: Proc. 5th Intl. Conf. Electronic Commerce Research (ICECR-5) (2002)

    Google Scholar 

  30. Hao, D., Ren, Y., Sakurai, K.: A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 237–252. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  31. Liu, D., Wang, X.F., Camp, J.L.: ‘Game Theoretic Modeling and Analysis of Insider Threats. International Journal of Critical Infrastructure Protection, 75–80 (2008)

    Google Scholar 

  32. Pirzada, A.A., Mcdonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 5(6), 695–710 (2006)

    Article  Google Scholar 

  33. Richard, M.K., Thomas, P.: Quantal Response Equilibria for Extensive Form Games. Experimental Economics 1, 9–41 (1998)

    MATH  Google Scholar 

  34. Gibbons, R.: Game Theory for Applied Economics. Princeton University Press, Princeton (1992)

    Google Scholar 

  35. Alpcan, T., Basar, T.: Network Security: A Decision and Game Theoretic Approach, November 30. Cambridge University Press (2010)

    Google Scholar 

  36. Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York (2005)

    Book  MATH  Google Scholar 

  37. Binmore, K.G.: Playing for real: a text on game theory. Oxford University Press (2007) ISBN 0195300572, 9780195300574

    Google Scholar 

  38. McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, Version 0, September 01 (2010), http://www.gambit-project.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hao, D., Adhikari, A., Sakurai, K. (2012). Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. In: Chen, L., Yung, M., Zhu, L. (eds) Trusted Systems. INTRUST 2011. Lecture Notes in Computer Science, vol 7222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32298-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32297-6

  • Online ISBN: 978-3-642-32298-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics