skip to main content
10.1145/1774088.1774402acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

iTrust: an integrated trust framework for wireless sensor networks

Published:22 March 2010Publication History

ABSTRACT

Designing security solutions for Wireless Sensor Networks is a challenging task due to the potential hostile and unattended environment in which they operate as well as their resource constrained nature. A trust management framework can be useful for detecting untrustworthy nodes under such operational conditions. In an unattended autonomous network, the attacker can capture a sensor node and modify its regular functioning. Consequently, the compromised node will thereafter behave erratically, which, in most cases, is observable by nodes in the corresponding neighborhood. In this paper, we propose iTrust- an integrated trust framework in which monitor nodes, a set of specialty nodes, will evaluate neighborhood nodes based on their behavior in a session wise manner. Monitor nodes, in promiscuous mode, will garner information about nodes in their neighborhood. After each session, they will share trust indices of each node with their neighbors, which is used for future decision-making. We have simulated iTrust framework with a tolerance of 5%--25% network error rate and evaluated its performance. We have further evaluated the attack detection effectiveness of iTrust framework by simulating different attack scenarios and confirmed its robustness to several known attacks.

References

  1. Kuldeep, Kalpana Sharma, M. K. Ghose," Wireless Sensor Networks Security: A New Approach", In proceedings of 16th International Conference on Advanced Computing and Communication, 13--16 Dec 2008, MIT Chennai.Google ScholarGoogle Scholar
  2. Kuldeep et. al, "Complete Security Framework for Wireless Sensor Networks", In International Journal of Computer Science and Information Security (IJCSIS), Vol 3, No. 1, 2009, ISSN 1947--5500.Google ScholarGoogle Scholar
  3. S. Ganeriwal and M. B. Srivastava. Reputation-Based Framework for High Integrity Sensor Networks. In 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. pages 66--77, Washington, DC, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Z. Yao, D. Kim, I. Lee, K. Kim, and J. Jang. A Security Framework with Trust Management for Sensor Networks. In Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pages 190--198, 2005.Google ScholarGoogle Scholar
  5. Lei Huang, Lei Li and Qiang Tan, Behavior-Based Trust in Wireless Sensor Network, H. T. Shen et al. (Eds.): APWeb Workshops 2006, LNCS 3842, pp. 214--223, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Haiguang Chen, Task-based Trust Management for Wireless Sensor Networks, International Journal of Security and Its Applications, Vol. 3, No. 2, April, 2009.Google ScholarGoogle Scholar
  7. Q. Ren and Q. Liang. Secure media access control (mac) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC 2004, 2004.Google ScholarGoogle Scholar
  8. Doumit, S. and Agrawal, D. (2003) Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks. MILCOM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Onat, I, Miri, A, "An Intrusion Detection System for Wireless Sensor Networks" In proceedings of WiMob' 2005, 22--24 Aug 2005, pp(253--259).Google ScholarGoogle Scholar
  10. Bo Yu and Bin Xiao. Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In Parallel and Distributed Processing Symposium, 2006. IPDPS (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm (2003).Google ScholarGoogle ScholarCross RefCross Ref
  12. Haiguang Chen et. al, "Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks", C. C. Yang et al. (Eds.): PAISI 2007, LNCS 4430, pp. 105--116, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lei Huang, Lei Li, and Qiang Tan, Behavior-Based Trust in Wireless Sensor Network, H. T. Shen et al. (Eds.): APWeb Workshops 2006, LNCS 3842, pp. 214--223, 2006.' Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Srinivasan and J. Wu. "A Survey on Secure Localization in Wireless Sensor Networks". In Encyclopedia of Wireless and Mobile Communications, B. Furht (ed.), CRC Press, Taylor and Francis Group. 2007.Google ScholarGoogle Scholar
  15. www.omnetpp.orgGoogle ScholarGoogle Scholar
  16. http://castalia.npc.nicta.com.au/Google ScholarGoogle Scholar
  17. Athanassios Boulis, "Castalia: User' Manual" August 2009, NICTA.Google ScholarGoogle Scholar

Index Terms

  1. iTrust: an integrated trust framework for wireless sensor networks

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
                March 2010
                2712 pages
                ISBN:9781605586397
                DOI:10.1145/1774088

                Copyright © 2010 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 22 March 2010

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                SAC '10 Paper Acceptance Rate364of1,353submissions,27%Overall Acceptance Rate1,650of6,669submissions,25%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader