skip to main content
10.1145/1774088.1774402acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

iTrust: an integrated trust framework for wireless sensor networks

Published: 22 March 2010 Publication History

Abstract

Designing security solutions for Wireless Sensor Networks is a challenging task due to the potential hostile and unattended environment in which they operate as well as their resource constrained nature. A trust management framework can be useful for detecting untrustworthy nodes under such operational conditions. In an unattended autonomous network, the attacker can capture a sensor node and modify its regular functioning. Consequently, the compromised node will thereafter behave erratically, which, in most cases, is observable by nodes in the corresponding neighborhood. In this paper, we propose iTrust- an integrated trust framework in which monitor nodes, a set of specialty nodes, will evaluate neighborhood nodes based on their behavior in a session wise manner. Monitor nodes, in promiscuous mode, will garner information about nodes in their neighborhood. After each session, they will share trust indices of each node with their neighbors, which is used for future decision-making. We have simulated iTrust framework with a tolerance of 5%--25% network error rate and evaluated its performance. We have further evaluated the attack detection effectiveness of iTrust framework by simulating different attack scenarios and confirmed its robustness to several known attacks.

References

[1]
Kuldeep, Kalpana Sharma, M. K. Ghose," Wireless Sensor Networks Security: A New Approach", In proceedings of 16th International Conference on Advanced Computing and Communication, 13--16 Dec 2008, MIT Chennai.
[2]
Kuldeep et. al, "Complete Security Framework for Wireless Sensor Networks", In International Journal of Computer Science and Information Security (IJCSIS), Vol 3, No. 1, 2009, ISSN 1947--5500.
[3]
S. Ganeriwal and M. B. Srivastava. Reputation-Based Framework for High Integrity Sensor Networks. In 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. pages 66--77, Washington, DC, USA, 2004.
[4]
Z. Yao, D. Kim, I. Lee, K. Kim, and J. Jang. A Security Framework with Trust Management for Sensor Networks. In Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pages 190--198, 2005.
[5]
Lei Huang, Lei Li and Qiang Tan, Behavior-Based Trust in Wireless Sensor Network, H. T. Shen et al. (Eds.): APWeb Workshops 2006, LNCS 3842, pp. 214--223, 2006.
[6]
Haiguang Chen, Task-based Trust Management for Wireless Sensor Networks, International Journal of Security and Its Applications, Vol. 3, No. 2, April, 2009.
[7]
Q. Ren and Q. Liang. Secure media access control (mac) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC 2004, 2004.
[8]
Doumit, S. and Agrawal, D. (2003) Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks. MILCOM.
[9]
Onat, I, Miri, A, "An Intrusion Detection System for Wireless Sensor Networks" In proceedings of WiMob' 2005, 22--24 Aug 2005, pp(253--259).
[10]
Bo Yu and Bin Xiao. Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In Parallel and Distributed Processing Symposium, 2006. IPDPS (2006).
[11]
Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm (2003).
[12]
Haiguang Chen et. al, "Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks", C. C. Yang et al. (Eds.): PAISI 2007, LNCS 4430, pp. 105--116, 2007.
[13]
Lei Huang, Lei Li, and Qiang Tan, Behavior-Based Trust in Wireless Sensor Network, H. T. Shen et al. (Eds.): APWeb Workshops 2006, LNCS 3842, pp. 214--223, 2006.'
[14]
A. Srinivasan and J. Wu. "A Survey on Secure Localization in Wireless Sensor Networks". In Encyclopedia of Wireless and Mobile Communications, B. Furht (ed.), CRC Press, Taylor and Francis Group. 2007.
[15]
www.omnetpp.org
[16]
http://castalia.npc.nicta.com.au/
[17]
Athanassios Boulis, "Castalia: User' Manual" August 2009, NICTA.

Cited By

View all
  • (2024)ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenanceProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670933(1-11)Online publication date: 30-Jul-2024
  • (2018)Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor NetworksIEEE Sensors Journal10.1109/JSEN.2018.284820518:15(6446-6460)Online publication date: 1-Aug-2018
  • (2018)A Distributed Trust Management Scheme for Data Forwarding in Satellite DTN Emergency CommunicationsIEEE Journal on Selected Areas in Communications10.1109/JSAC.2018.280409836:2(246-256)Online publication date: Feb-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
March 2010
2712 pages
ISBN:9781605586397
DOI:10.1145/1774088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. monitoring
  2. promiscuous
  3. security
  4. sensor networks
  5. trust

Qualifiers

  • Research-article

Conference

SAC'10
Sponsor:
SAC'10: The 2010 ACM Symposium on Applied Computing
March 22 - 26, 2010
Sierre, Switzerland

Acceptance Rates

SAC '10 Paper Acceptance Rate 364 of 1,353 submissions, 27%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)3
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenanceProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670933(1-11)Online publication date: 30-Jul-2024
  • (2018)Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor NetworksIEEE Sensors Journal10.1109/JSEN.2018.284820518:15(6446-6460)Online publication date: 1-Aug-2018
  • (2018)A Distributed Trust Management Scheme for Data Forwarding in Satellite DTN Emergency CommunicationsIEEE Journal on Selected Areas in Communications10.1109/JSAC.2018.280409836:2(246-256)Online publication date: Feb-2018
  • (2017)The adoption of socio‐ and bio‐inspired algorithms for trust models in wireless sensor networks: A surveyInternational Journal of Communication Systems10.1002/dac.344431:7Online publication date: 2-Nov-2017
  • (2016)Limiting the Influence of Low Quality Information in Community SensingProceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems10.5555/2936924.2937052(873-881)Online publication date: 9-May-2016
  • (2016)Two novel subjective logic-based in-network data processing schemes in wireless sensor networks2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2016.7763239(1-6)Online publication date: Oct-2016
  • (2016)Energetic trust management services over unattended wireless sensor networks2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)10.1109/RTEICT.2016.7807845(377-381)Online publication date: May-2016
  • (2016)A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)10.1109/CSCloud.2016.32(95-101)Online publication date: Jun-2016
  • (2015)Dishonest recommendation attacks in wireless sensor networks: A survey2015 12th International Symposium on Programming and Systems (ISPS)10.1109/ISPS.2015.7244964(1-10)Online publication date: Apr-2015
  • (2015)A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networksFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-014-4212-59:2(280-296)Online publication date: 1-Apr-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media