ABSTRACT
Designing security solutions for Wireless Sensor Networks is a challenging task due to the potential hostile and unattended environment in which they operate as well as their resource constrained nature. A trust management framework can be useful for detecting untrustworthy nodes under such operational conditions. In an unattended autonomous network, the attacker can capture a sensor node and modify its regular functioning. Consequently, the compromised node will thereafter behave erratically, which, in most cases, is observable by nodes in the corresponding neighborhood. In this paper, we propose iTrust- an integrated trust framework in which monitor nodes, a set of specialty nodes, will evaluate neighborhood nodes based on their behavior in a session wise manner. Monitor nodes, in promiscuous mode, will garner information about nodes in their neighborhood. After each session, they will share trust indices of each node with their neighbors, which is used for future decision-making. We have simulated iTrust framework with a tolerance of 5%--25% network error rate and evaluated its performance. We have further evaluated the attack detection effectiveness of iTrust framework by simulating different attack scenarios and confirmed its robustness to several known attacks.
- Kuldeep, Kalpana Sharma, M. K. Ghose," Wireless Sensor Networks Security: A New Approach", In proceedings of 16th International Conference on Advanced Computing and Communication, 13--16 Dec 2008, MIT Chennai.Google Scholar
- Kuldeep et. al, "Complete Security Framework for Wireless Sensor Networks", In International Journal of Computer Science and Information Security (IJCSIS), Vol 3, No. 1, 2009, ISSN 1947--5500.Google Scholar
- S. Ganeriwal and M. B. Srivastava. Reputation-Based Framework for High Integrity Sensor Networks. In 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. pages 66--77, Washington, DC, USA, 2004. Google ScholarDigital Library
- Z. Yao, D. Kim, I. Lee, K. Kim, and J. Jang. A Security Framework with Trust Management for Sensor Networks. In Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pages 190--198, 2005.Google Scholar
- Lei Huang, Lei Li and Qiang Tan, Behavior-Based Trust in Wireless Sensor Network, H. T. Shen et al. (Eds.): APWeb Workshops 2006, LNCS 3842, pp. 214--223, 2006. Google ScholarDigital Library
- Haiguang Chen, Task-based Trust Management for Wireless Sensor Networks, International Journal of Security and Its Applications, Vol. 3, No. 2, April, 2009.Google Scholar
- Q. Ren and Q. Liang. Secure media access control (mac) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC 2004, 2004.Google Scholar
- Doumit, S. and Agrawal, D. (2003) Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks. MILCOM. Google ScholarDigital Library
- Onat, I, Miri, A, "An Intrusion Detection System for Wireless Sensor Networks" In proceedings of WiMob' 2005, 22--24 Aug 2005, pp(253--259).Google Scholar
- Bo Yu and Bin Xiao. Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In Parallel and Distributed Processing Symposium, 2006. IPDPS (2006). Google ScholarDigital Library
- Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm (2003).Google ScholarCross Ref
- Haiguang Chen et. al, "Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks", C. C. Yang et al. (Eds.): PAISI 2007, LNCS 4430, pp. 105--116, 2007. Google ScholarDigital Library
- Lei Huang, Lei Li, and Qiang Tan, Behavior-Based Trust in Wireless Sensor Network, H. T. Shen et al. (Eds.): APWeb Workshops 2006, LNCS 3842, pp. 214--223, 2006.' Google ScholarDigital Library
- A. Srinivasan and J. Wu. "A Survey on Secure Localization in Wireless Sensor Networks". In Encyclopedia of Wireless and Mobile Communications, B. Furht (ed.), CRC Press, Taylor and Francis Group. 2007.Google Scholar
- www.omnetpp.orgGoogle Scholar
- http://castalia.npc.nicta.com.au/Google Scholar
- Athanassios Boulis, "Castalia: User' Manual" August 2009, NICTA.Google Scholar
Index Terms
- iTrust: an integrated trust framework for wireless sensor networks
Recommendations
Key establishment and management for WSNs
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low-power, and multi-functional sensor nodes that communicate at short distances through wireless links. Those networks could be deployed in an open and hostile environment ...
Hallway monitoring with sensor networks
SenSys '09: Proceedings of the 7th ACM Conference on Embedded Networked Sensor SystemsWe present a sensor network that monitors a hallway. It consists of 180 load sensors connected to 30 wireless sensor nodes, where the setup is of extremely low cost and easily transferred to other settings. Our network serves as a testbed for in-network ...
Group-based key predistribution for wireless sensor networks
Many key predistribution techniques have been developed recently to establish pairwise keys between sensor nodes in wireless sensor networks. To further improve these schemes, researchers have also proposed to take advantage of the sensors' expected ...
Comments