Scalable Trust-Based Secure WSNs

Abstract

In this paper, we consider the scalable of wireless sensor networks with trust-based security. In our setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic algorithms are not allowed. We focus on the scalability of the network and proposed new testing algorithms and evaluation algorithms to test new nodes added, which give them reasonable values of trust. Based on these algorithms, we proposed new components for trust management system of wireless sensor networks.

Share and Cite:

Agrawal, A. and Wei, R. (2014) Scalable Trust-Based Secure WSNs. Journal of Computer and Communications, 2, 17-22. doi: 10.4236/jcc.2014.27003.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Huang,L., Li, L.and Tan,Q. (2006) Behavior-BasedTrust in Wireless Sensor Network.Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications, 214-223.
[2] Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proceedingsof the 6th Annual International Conference on Mobile Computing and Networking, 255-265.
[3] Ganeriwal, S., Balzano, L.K. and Srivastava, M.B. (2008) Reputation-Based Framework for High Integrity Sensor Networks.ACM Transactions on Sensor Networks (TOSN), 4, Article No. 15. http://dx.doi.org/10.1145/1362542.1362546
[4] Aivaloglou, E. and Gritzalis, S. (2010) Hybrid Trust and Reputation Management for Sensor Networks. Wireless Networks, 16, 1493-1510. http://dx.doi.org/10.1007/s11276-009-0216-8
[5] Bao, F., Chen, I.-R., Chang, M.J. and Cho, J.-H. (2012) Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.IEEE Transactions on Network and Service Management, 9, 169-183. http://dx.doi.org/10.1109/TCOMM.2012.031912.110179
[6] Lopez, J., Roman, R., Agudo, I. and Fernandez-Gago, C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33, 1086-1093. http://dx.doi.org/10.1016/j.comcom.2010.02.006
[7] Chen, X., Makki, K., Yen, K. and Pissinou, N. (2009) Sensor Network Security: A Survey. IEEE Communications Surveys Tutorials, 11, 52-73. http://dx.doi.org/10.1109/SURV.2009.090205
[8] Cho, J.H., Swami, A. and Chen, I.R. (2011) A Survey on Trust Management for Mobile and Ad Hoc Networks.IEEE Communications Surveys Tutorials, 13, 562-583. http://dx.doi.org/10.1109/SURV.2011.092110.00088
[9] Hu, W., Corke, P., Ship, W. C. and Overs, L. (2009) sec-Fleck: A Public Key Technology Platform for Wireless Sensor Networks. In: Roedig, U. and Sreenan, C.J., Eds., EWSN 2009, LNCS5432, 296-311.
[10] W. Hu, et al. (2010) Toward Trusted Wireless Sensor Networks.ACM Transactions on Sensor Networks, 7, 1-25. http://dx.doi.org/10.1145/1806895.1806900
[11] Yissoff, Y.M. and Hashim, H. (2010) Trusted Wireless Sensor Node Platform. Proceedings of the World Congress on Engineering 2010, London, 774-779.
[12] Velloso, P.B., et al. (2010) Trust Management in Mobile ad Hoc Networks Using a Scalable Maturity-Based Model. IEEE Transactions on Network and Service Management, 7, 172-185. http://dx.doi.org/10.1109/TNSM.2010.1009.I9P0339

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.