ABSTRACT
The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. Fundamental to this is the observation that cryptography cannot prevent malicious or non-malicious insertion of data from internal adversaries or faulty nodes.
We believe that in general tools from different domains such as economics, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach for countering all types of misbehavior resulting from malicious and faulty nodes.
We are currently developing a system within this framework where we employ a Bayesian formulation, specifically a beta reputation system, for reputation representation, updates and integration. We will explain the reasoning behind our design choices, analyzing their pros & cons. We conclude the paper by verifying the efficacy of this system through some preliminary simulation results.
- C. Karlof, D. Wagner. Secure routing in sensor networks: Attacks and countermeasures. Elsevier AdHoc Networks journal, May 2003.]]Google Scholar
- A. Perrig, J. Stankovic, D. Wagner. Security in Wireless Sensor Networks. Communications of the ACM, 2004.]] Google ScholarDigital Library
- J. Newsome, E. Shi, D. Song, A. Perrig. The sybil attack in sensor networks: Analysis and Defenses. In Proceedings of IPTPS. March 2002.]]Google Scholar
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.]] Google ScholarDigital Library
- C. Karlof, N. Sastry, D. Wagner. TinySec: Link Layer Encryption for Tiny Devices. To appear in ACM SenSys, 2004.]]Google Scholar
- J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.]] Google ScholarDigital Library
- R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P. Kruus. TinyPK: Securing Sensor Networks with Public Key Technology. To appear in second workshop on Security in Sensor and Ad-hoc Networks, 2004.]] Google ScholarDigital Library
- S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.]]Google Scholar
- F. Ye, H. Luo, S. Lu, L. Zhang. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In Proceedings of IEEE Infocom, 2004.]]Google Scholar
- L. Eschenauer, V. D. Gligor. A key Management Scheme for Distributed Sensor networks. In Proceedings of ACM CCS, November 2002.]] Google ScholarDigital Library
- H. Chan, A. Perrig, D. Song. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of IEEE Symposium on Security and Privacy, 2003.]] Google ScholarDigital Library
- D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of ACM CCS, October 2003.]] Google ScholarDigital Library
- M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proceedings of IEEE Conf. Security and Privacy, 1996, Oakland, California, USA.]] Google ScholarDigital Library
- M. Blaze, J. Feigenbaum, J. Ioannidis and A. Keromytis. RFC2704 - The KeyNote Trust Management System Version 2. 1999.]] Google ScholarDigital Library
- N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland.]] Google ScholarDigital Library
- P. Resnick, R. Zeckhauser. Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. NBER workshop on empirical studies of electronic commerce, 2000.]]Google Scholar
- S. Buchegger, J. L. Boudec. Performance analysis of the CONFIDANT protocol. In Proceedings of ACM Mobihoc, 2002.]] Google ScholarDigital Library
- P. Michiardi, R. Molva. CORE: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security, September, 2002.]] Google ScholarDigital Library
- L. Xiong, L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. IEEE conference on e-commerce, 2003.]] Google ScholarDigital Library
- S. Buchegger, J. L. Boudec. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. EPFL technical report, 2003.]]Google Scholar
- S. Buchegger, J. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004.]]Google Scholar
- C. Dellarocas. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of ICIS, 2000.]] Google ScholarDigital Library
- B. Przydatesk, D. Song, A. Perrig. SIA: Secure Information Aggregation in Sensor Networks. In Proceedings of ACM SenSys, 2003.]] Google ScholarDigital Library
- R. L. Trivers. The evolution of reciprocal altruism. Quarterly review of biology, 46:35--57.]]Google Scholar
- P. Resnick, K. Kuwabara, R. Zeckhauser, E. Friedman. Reputation systems: Facilitating trust in e-commerce systems. Communications of the ACM, 43(12): 45--48.]] Google ScholarDigital Library
- A. Jsang and R. Ismail. The Beta Reputation System. In Proceedings of the 15th Bled Electronic Commerce Conference, June 2002.]]Google Scholar
- G. Shafer. A mathematical theory of evidence. Princeton University, 1976.]]Google Scholar
- A. Jøsang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279--311, June 2001.]] Google ScholarDigital Library
- Beta distribution from Mathword. http://mathworld.wolfram.com/BetaDistribution.html]]Google Scholar
- S. Ganeriwal, V. Tsiatsis, C. Schurgers, M. B. Srivastava. NESLsim: A Parsec based Simulation Platform for Sensor Networks. http://www.ee.ucla.edu/ saurabh/NESLsim?]]Google Scholar
- F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of seventh International Security Protocols Workshop, 1999.]] Google ScholarDigital Library
Index Terms
- Reputation-based framework for high integrity sensor networks
Recommendations
Reputation-based framework for high integrity sensor networks
Sensor network technology promises a vast increase in automatic data collection capabilities through efficient deployment of tiny sensing devices. The technology will allow users to measure phenomena of interest at unprecedented spatial and temporal ...
A trust establishment scheme for cluster-based sensor networks
WiCOM'09: Proceedings of the 5th International Conference on Wireless communications, networking and mobile computingBecause sensor networks(WSN) often deployed in a wicked and hostile environment, individual nodes of WSN could be easily compromised by the adversary. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and ...
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks
EUC '10: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous ComputingIn this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged ...
Comments