skip to main content
10.1145/1029102.1029115acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Reputation-based framework for high integrity sensor networks

Published: 25 October 2004 Publication History

Abstract

The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. Fundamental to this is the observation that cryptography cannot prevent malicious or non-malicious insertion of data from internal adversaries or faulty nodes.
We believe that in general tools from different domains such as economics, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach for countering all types of misbehavior resulting from malicious and faulty nodes.
We are currently developing a system within this framework where we employ a Bayesian formulation, specifically a beta reputation system, for reputation representation, updates and integration. We will explain the reasoning behind our design choices, analyzing their pros & cons. We conclude the paper by verifying the efficacy of this system through some preliminary simulation results.

References

[1]
C. Karlof, D. Wagner. Secure routing in sensor networks: Attacks and countermeasures. Elsevier AdHoc Networks journal, May 2003.]]
[2]
A. Perrig, J. Stankovic, D. Wagner. Security in Wireless Sensor Networks. Communications of the ACM, 2004.]]
[3]
J. Newsome, E. Shi, D. Song, A. Perrig. The sybil attack in sensor networks: Analysis and Defenses. In Proceedings of IPTPS. March 2002.]]
[4]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.]]
[5]
C. Karlof, N. Sastry, D. Wagner. TinySec: Link Layer Encryption for Tiny Devices. To appear in ACM SenSys, 2004.]]
[6]
J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.]]
[7]
R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P. Kruus. TinyPK: Securing Sensor Networks with Public Key Technology. To appear in second workshop on Security in Sensor and Ad-hoc Networks, 2004.]]
[8]
S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.]]
[9]
F. Ye, H. Luo, S. Lu, L. Zhang. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In Proceedings of IEEE Infocom, 2004.]]
[10]
L. Eschenauer, V. D. Gligor. A key Management Scheme for Distributed Sensor networks. In Proceedings of ACM CCS, November 2002.]]
[11]
H. Chan, A. Perrig, D. Song. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of IEEE Symposium on Security and Privacy, 2003.]]
[12]
D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of ACM CCS, October 2003.]]
[13]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proceedings of IEEE Conf. Security and Privacy, 1996, Oakland, California, USA.]]
[14]
M. Blaze, J. Feigenbaum, J. Ioannidis and A. Keromytis. RFC2704 - The KeyNote Trust Management System Version 2. 1999.]]
[15]
N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland.]]
[16]
P. Resnick, R. Zeckhauser. Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. NBER workshop on empirical studies of electronic commerce, 2000.]]
[17]
S. Buchegger, J. L. Boudec. Performance analysis of the CONFIDANT protocol. In Proceedings of ACM Mobihoc, 2002.]]
[18]
P. Michiardi, R. Molva. CORE: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security, September, 2002.]]
[19]
L. Xiong, L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. IEEE conference on e-commerce, 2003.]]
[20]
S. Buchegger, J. L. Boudec. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. EPFL technical report, 2003.]]
[21]
S. Buchegger, J. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004.]]
[22]
C. Dellarocas. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of ICIS, 2000.]]
[23]
B. Przydatesk, D. Song, A. Perrig. SIA: Secure Information Aggregation in Sensor Networks. In Proceedings of ACM SenSys, 2003.]]
[24]
R. L. Trivers. The evolution of reciprocal altruism. Quarterly review of biology, 46:35--57.]]
[25]
P. Resnick, K. Kuwabara, R. Zeckhauser, E. Friedman. Reputation systems: Facilitating trust in e-commerce systems. Communications of the ACM, 43(12): 45--48.]]
[26]
A. Jsang and R. Ismail. The Beta Reputation System. In Proceedings of the 15th Bled Electronic Commerce Conference, June 2002.]]
[27]
G. Shafer. A mathematical theory of evidence. Princeton University, 1976.]]
[28]
A. Jøsang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279--311, June 2001.]]
[29]
Beta distribution from Mathword. http://mathworld.wolfram.com/BetaDistribution.html]]
[30]
S. Ganeriwal, V. Tsiatsis, C. Schurgers, M. B. Srivastava. NESLsim: A Parsec based Simulation Platform for Sensor Networks. http://www.ee.ucla.edu/ saurabh/NESLsim?]]
[31]
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of seventh International Security Protocols Workshop, 1999.]]

Cited By

View all
  • (2024)Research on trust mechanism in wireless sensor networksThird International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2023)10.1117/12.3023390(14)Online publication date: 1-Apr-2024
  • (2024)A Trust Management Method Based on Ensemble Learning for Ocean-Oriented Cloud-Edge Collaborative NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.3460737(1-1)Online publication date: 2024
  • (2023)Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty ComputationJournal of Sensor and Actuator Networks10.3390/jsan1201001412:1(14)Online publication date: 7-Feb-2023
  • Show More Cited By

Index Terms

  1. Reputation-based framework for high integrity sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
    October 2004
    124 pages
    ISBN:1581139721
    DOI:10.1145/1029102
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 October 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bayesian formulation
    2. cryptography
    3. framework
    4. reputation
    5. security
    6. sensor networks
    7. trust

    Qualifiers

    • Article

    Conference

    CCS04
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Research on trust mechanism in wireless sensor networksThird International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2023)10.1117/12.3023390(14)Online publication date: 1-Apr-2024
    • (2024)A Trust Management Method Based on Ensemble Learning for Ocean-Oriented Cloud-Edge Collaborative NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.3460737(1-1)Online publication date: 2024
    • (2023)Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty ComputationJournal of Sensor and Actuator Networks10.3390/jsan1201001412:1(14)Online publication date: 7-Feb-2023
    • (2023)HC-TUS: Human Cognition-Based Trust Update Scheme for AI-Enabled VANETIEEE Network10.1109/MNET.2023.332093437:5(247-252)Online publication date: Sep-2023
    • (2023)An Improved Stochastic Fractal Search Based on Entropy Multitrust Fusion Model for IoT-Enabled WSNs ClusteringIEEE Sensors Journal10.1109/JSEN.2023.332401323:23(29694-29704)Online publication date: 1-Dec-2023
    • (2023)Controversy-Adjudication-Based Trust Management Mechanism in the Internet of Underwater ThingsIEEE Internet of Things Journal10.1109/JIOT.2022.321563510:3(2603-2614)Online publication date: 1-Feb-2023
    • (2023)A Trust Aware Secure Ant Colony Optimization Based Routing Algorithm for Internet of Things2023 9th International Conference on Computer and Communication Engineering (ICCCE)10.1109/ICCCE58854.2023.10246057(58-63)Online publication date: 15-Aug-2023
    • (2023)Generalized Secure and Dynamic Decentralized Reputation System With a Dishonest MajorityIEEE Access10.1109/ACCESS.2023.323939411(9368-9388)Online publication date: 2023
    • (2023)Dragon fly algorithm based approach for escalating the security among the nodes in wireless sensor network based systemSN Applied Sciences10.1007/s42452-023-05614-25:12Online publication date: 30-Nov-2023
    • (2023)RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNsWireless Personal Communications: An International Journal10.1007/s11277-022-10165-7129:2(953-991)Online publication date: 11-Jan-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media