scispace - formally typeset
Journal ArticleDOI

Trust management in wireless sensor networks

Reads0
Chats0
TLDR
The goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities, and to explore the interplay among the implementation requirements, the resource consumption and the achieved security.
Abstract
SUMMARY The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node’s trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd.

read more

Citations
More filters
Patent

Adaptive multi-interface use for content networking

TL;DR: In this article, a hierarchical structured variable-length identifier (HSVLI) is used to indicate a piece of content and indicate a hierarchical structure of contiguous components ordered from a most general level to a most specific level.
Patent

Ordered-element naming for name-based packet forwarding

TL;DR: In this paper, a name-based content-forwarding system generates an ordered-element name for a content item, and can process an interest to identify and perform an action that satisfies the interest.

Faulty Node Detection in Wireless Sensor Networks Using Cluster

TL;DR: Since the accuracy of data is important to the whole system's performance, detecting nodes with faulty readings is an essenti al issue in network management and removal from a system or replacing them with good ones improve the wholesystem's performance and at the same time prolong the lifetime of the network.
Proceedings ArticleDOI

A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks

TL;DR: This paper summarizes and highlights the key ideas of existing fault tolerant techniques of routing protocols, survey existing routing protocols proposed to support fault tolerance, and provides some future research directions in the area of fault tolerance in wireless sensor networks routing.
Journal ArticleDOI

Congestion control in wireless sensor networks based on bird flocking behavior

TL;DR: It is proposed that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs).
References
More filters
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Book ChapterDOI

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Proceedings ArticleDOI

Performance analysis of the CONFIDANT protocol

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Proceedings Article

Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Related Papers (5)