skip to main content
10.1145/1029102.1029115acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Reputation-based framework for high integrity sensor networks

Published:25 October 2004Publication History

ABSTRACT

The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. Fundamental to this is the observation that cryptography cannot prevent malicious or non-malicious insertion of data from internal adversaries or faulty nodes.

We believe that in general tools from different domains such as economics, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach for countering all types of misbehavior resulting from malicious and faulty nodes.

We are currently developing a system within this framework where we employ a Bayesian formulation, specifically a beta reputation system, for reputation representation, updates and integration. We will explain the reasoning behind our design choices, analyzing their pros & cons. We conclude the paper by verifying the efficacy of this system through some preliminary simulation results.

References

  1. C. Karlof, D. Wagner. Secure routing in sensor networks: Attacks and countermeasures. Elsevier AdHoc Networks journal, May 2003.]]Google ScholarGoogle Scholar
  2. A. Perrig, J. Stankovic, D. Wagner. Security in Wireless Sensor Networks. Communications of the ACM, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Newsome, E. Shi, D. Song, A. Perrig. The sybil attack in sensor networks: Analysis and Defenses. In Proceedings of IPTPS. March 2002.]]Google ScholarGoogle Scholar
  4. A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Karlof, N. Sastry, D. Wagner. TinySec: Link Layer Encryption for Tiny Devices. To appear in ACM SenSys, 2004.]]Google ScholarGoogle Scholar
  6. J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P. Kruus. TinyPK: Securing Sensor Networks with Public Key Technology. To appear in second workshop on Security in Sensor and Ad-hoc Networks, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.]]Google ScholarGoogle Scholar
  9. F. Ye, H. Luo, S. Lu, L. Zhang. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In Proceedings of IEEE Infocom, 2004.]]Google ScholarGoogle Scholar
  10. L. Eschenauer, V. D. Gligor. A key Management Scheme for Distributed Sensor networks. In Proceedings of ACM CCS, November 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Chan, A. Perrig, D. Song. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of IEEE Symposium on Security and Privacy, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of ACM CCS, October 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proceedings of IEEE Conf. Security and Privacy, 1996, Oakland, California, USA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Blaze, J. Feigenbaum, J. Ioannidis and A. Keromytis. RFC2704 - The KeyNote Trust Management System Version 2. 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Resnick, R. Zeckhauser. Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. NBER workshop on empirical studies of electronic commerce, 2000.]]Google ScholarGoogle Scholar
  17. S. Buchegger, J. L. Boudec. Performance analysis of the CONFIDANT protocol. In Proceedings of ACM Mobihoc, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Michiardi, R. Molva. CORE: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security, September, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Xiong, L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. IEEE conference on e-commerce, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Buchegger, J. L. Boudec. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. EPFL technical report, 2003.]]Google ScholarGoogle Scholar
  21. S. Buchegger, J. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004.]]Google ScholarGoogle Scholar
  22. C. Dellarocas. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of ICIS, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Przydatesk, D. Song, A. Perrig. SIA: Secure Information Aggregation in Sensor Networks. In Proceedings of ACM SenSys, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. L. Trivers. The evolution of reciprocal altruism. Quarterly review of biology, 46:35--57.]]Google ScholarGoogle Scholar
  25. P. Resnick, K. Kuwabara, R. Zeckhauser, E. Friedman. Reputation systems: Facilitating trust in e-commerce systems. Communications of the ACM, 43(12): 45--48.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Jsang and R. Ismail. The Beta Reputation System. In Proceedings of the 15th Bled Electronic Commerce Conference, June 2002.]]Google ScholarGoogle Scholar
  27. G. Shafer. A mathematical theory of evidence. Princeton University, 1976.]]Google ScholarGoogle Scholar
  28. A. Jøsang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279--311, June 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Beta distribution from Mathword. http://mathworld.wolfram.com/BetaDistribution.html]]Google ScholarGoogle Scholar
  30. S. Ganeriwal, V. Tsiatsis, C. Schurgers, M. B. Srivastava. NESLsim: A Parsec based Simulation Platform for Sensor Networks. http://www.ee.ucla.edu/ saurabh/NESLsim?]]Google ScholarGoogle Scholar
  31. F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of seventh International Security Protocols Workshop, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reputation-based framework for high integrity sensor networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
      October 2004
      124 pages
      ISBN:1581139721
      DOI:10.1145/1029102

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 October 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader