Abstract
Wireless sensor networks are vulnerable to a large number of security threats and malicious attacks. The traditional security approaches from encryption and authentication are insufficient to defend the insider attacks which are launched inside of the WSNs and bypass the crypto-based defence. Trust management has been recently suggested as one of the effective security mechanisms for distributed systems, and is a promising new approach to solve the security challenges in wireless sensor networks. However, to the best of our knowledge, it is still a challenge to establish an integrated trust management mechanism with comprehensive security analysis. In this paper, we consider the clustered wireless sensor network in which the cluster head is in charge of the trust management of other sensor nodes. We propose a novel, integrated trust management mechanism for the cluster wireless sensor networks, and analyze the optimal decision making policy by using game theory. First, the upstream/downstream joint monitoring scheme is implemented to securely and efficiently observe the behavior of the insider nodes. Then based on the monitoring results, the local trustworthiness and global trust worthiness are derived based on the trust exchange and the trust computation. Finally, by game theoretic analysis of the security interaction between the attacker and the network, the optimal trust policy can be made based on min-max rule, and the optimal utility of the WSNs can be guaranteed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2292–2330 (2008)
Perrig, A., Stankovich, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 17th IEEE Symp. on Security and Privacy, pp. 164–173. IEEE Computer Society (1996)
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst., 618–644 (March 2005)
Josang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006), Darlinghurst, Australia, vol. 48, pp. 85–94 (2006)
Gollmann, D.: From Access Control to Trust Management, and Back – A Petition. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.) IFIPTM 2011. IFIP AICT, vol. 358, pp. 1–8. Springer, Heidelberg (2011)
Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of ACM Security for Ad-hoc and Sensor Networks, SASN (2004)
Shaikh, R.A., Jameel, H., Brian, J., Lee, H., Lee, S., Song, Y.J.: Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 1698–1712 (November 2009)
Momani, M., Challa, S., Alhmouz, R.: Can we trust trusted nodes in wireless sensor networks? In: International Conference on Computer and Communication Engineering (ICCCE 2008) (May 2008)
Lin, C., Vijay, V.: A Hybrid Trust Model for Enhancing Security in Distributed Systems. In: The Second International Conference on Availability, Reliability and Security, pp. 35–42 (2007)
Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5) (July 2010)
Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case. IEEE/ACM Transactions on Networking 16(1), 63–76 (2008)
Gómez, F., Girao, J., Pérez, G.M.: TRIMS, a privacy-aware trust and reputation model for identity management systems. Comput. Netw. 54(16) (November 2010)
Shila, D.M., Cheng, Y.: Mitigating selective forwarding attacks with a Channel Aware Approach in WMNs. IEEE Transaction on Wireless Communications (May 2010)
Ellison, C.M., Franz, B., Rivest, R., Thomas, B.M., Ylonen, T.: Simple public key infrastructure certificate theory. IETF RFC 2693 (1999)
Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V.: dRBAC: Distributed role-based access control for dynamic coalition environments. Technical Report, TR 2001-819, New York University (2001)
Velloso, B., Laufer, P., Duarte, O., Pujolle, G.: A Trust Model Robust to Slander Attacks in Ad Hoc Networks. In: Proceedings of 17th International Conference on Computer Communications and Networks (ICCCN 2008), pp. 1–6 (2008)
Lynch, D.M.: Securing against insider attacks. Information Security Systems 15(5), 39–47 (2006)
Kantzavelou, I., Katsikas, S.: A game-based intrusion detection mechanism to confront internal attackers. Computers Security 29(8), 859–874 (2010)
Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks. Wiley-Interscience (2007) ISBN:0471756881
Bace, R.G.: Intrusion detection. Macmillan Publishing Co., Inc., Indianapolis (2001)
Xue, X.Y., Leneutre, J., BenOthman, J.: A Trust-based Routing Prtocol for Ad Hoc Networks. In: Proceeding of Mobile and Wireless Communications Networks, pp. 251–262 (October 2004)
Royer, E.M., Toh, C.K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 46–55 (April 1999)
Bao, F., Chen, I.-R., Chang, M., Cho, J.: Hierarchical trust management for wireless sensor networks and its application to trust-based routing. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1732–1738. New York (2011)
Scott, K., Bambos, N.: Routing and channel assignment for low power transmission in PCS. In: Proc. IEEE ICUPC 1996, vol. 2, pp. 498–502 (1996)
Singh, S., Woo, M., Raghavendra, C.S.: Power-aware routing in mobile ad hoc networks. In: Proc. ACM MobiCom 1998, pp. 181–190 (1998)
Toh, C.-K.: Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks. IEEE Communications Magazine, 138–147 (June 2001)
Li, H., Singhal, M.: Trust Management in Distributed Systems. Computer, 45–53 (February 2007)
Xiong, L., Liu, L.: Building Trust in Decentralized Peerto- Peer Electronic Communities. In: Proc. 5th Intl. Conf. Electronic Commerce Research (ICECR-5) (2002)
Hao, D., Ren, Y., Sakurai, K.: A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 237–252. Springer, Heidelberg (2011)
Liu, D., Wang, X.F., Camp, J.L.: ‘Game Theoretic Modeling and Analysis of Insider Threats. International Journal of Critical Infrastructure Protection, 75–80 (2008)
Pirzada, A.A., Mcdonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 5(6), 695–710 (2006)
Richard, M.K., Thomas, P.: Quantal Response Equilibria for Extensive Form Games. Experimental Economics 1, 9–41 (1998)
Gibbons, R.: Game Theory for Applied Economics. Princeton University Press, Princeton (1992)
Alpcan, T., Basar, T.: Network Security: A Decision and Game Theoretic Approach, November 30. Cambridge University Press (2010)
Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York (2005)
Binmore, K.G.: Playing for real: a text on game theory. Oxford University Press (2007) ISBN 0195300572, 9780195300574
McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, Version 0, September 01 (2010), http://www.gambit-project.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hao, D., Adhikari, A., Sakurai, K. (2012). Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. In: Chen, L., Yung, M., Zhu, L. (eds) Trusted Systems. INTRUST 2011. Lecture Notes in Computer Science, vol 7222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-32298-3_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32297-6
Online ISBN: 978-3-642-32298-3
eBook Packages: Computer ScienceComputer Science (R0)