SensorTrust: A resilient trust model for wireless sensing systems

نویسندگان

  • Guoxing Zhan
  • Weisong Shi
  • Hongmei Deng
چکیده

Wireless sensor networks (WSNs) are prone to failures and malicious attacks. Traditional approaches from encryption and authentication are not sufficient to solve the problems. Trust management of WSNs is bringing new approaches. However, it is still a challenge to establish a trust environment for WSNs. To conquer that challenge, we propose a resilient trust model with a focus on data integrity, SensorTrust, for hierarchical WSNs. SensorTrust integrates past history and recent risk to accurately identify the current trust level. It employs Gaussian model to rate data integrity in a fine-grained style and a flexible update protocol to adapt to varied context. With acceptable overhead, SensorTrust proves resilient against varied faults and attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust-Based Secure Aggregation in Wireless Sensor Networks

Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devices are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks

Wireless mesh networks are multi hop wireless networks with high performance requirements. To enhance the performance, a large number of routing protocols have been proposed focussing on various link properties.The metrics designed to capture various link properties make an important assumption that nodes cooperate in network operations. On the other hand, the nodes are spread over larger area ...

متن کامل

Resilient Supplier Selection in a Supply Chain by a New Interval-Valued Fuzzy Group Decision Model Based on Possibilistic Statistical Concepts

Supplier selection is one the main concern in the context of supply chain networks by considering their global and competitive features. Resilient supplier selection as generally new idea has not been addressed properly in the literature under uncertain conditions. Therefore, in this paper, a new multi-criteria group decision-making (MCGDM) model is introduced with interval-valued fuzzy sets (I...

متن کامل

Fast Authentication for Mobile Hosts in Wireless Mesh Networks

We aim at extending IEEE 802.11s standards to implement fast hand-off to support real-time applications such as VoIP and audio/video conferencing. We propose a novel trust model that represents the trust relationships among the entities of a WMN, and new authentication protocols based on that model. A client and a mesh access point (MAP) mutually authenticate each other using one-hop communicat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Pervasive and Mobile Computing

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2011