ABSTRACT
As sensor networks are being increasingly deployed in decision-making infrastructures such as battlefield monitoring systems and SCADA (Supervisory Control and Data Acquisition) systems, making decision makers aware of the trustworthiness of the collected data is a crucial. To address this problem, we propose a systematic method for assessing the trustworthiness of data items. Our approach uses the data provenance as well as their values in computing trust scores, that is, quantitative measures of trustworthiness. To obtain trust scores, we propose a cyclic framework which well reflects the inter-dependency property: the trust score of the data affects the trust score of the network nodes that created and manipulated the data, and vice-versa. The trust scores of data items are computed from their value similarity and provenance similarity. The value similarity comes from the principle that "the more similar values for the same event, the higher the trust scores". The provenance similarity is based on the principle that "the more different data provenances with similar values, the higher the trust scores". Experimental results show that our approach provides a practical solution for trustworthiness assessment in sensor networks.
- }}E. Bertino, C. Dai, H.-S. Lim, and D. Lin, "High-Assurance Integrity Techniques for Databases," In Proc. of the 25th British Nat'l Conf. on Databases, Cardiff, UK, pp. 244--256, July 2008. Google ScholarDigital Library
- }}C. Dai, D. Lin, E. Bertino, and M. Kantarcioglu, "An Approach to Evaluate Data Trustworthiness Based on Data Provenance," In Proc. of the 5th VLDB Workshop on Secure Data Management, Auckland, New Zealand, pp. 82--98, Aug. 2008. Google ScholarDigital Library
- }}C. Dai et al., "Query Processing Techniques for Compliance with Data Confidence Policies," In Proc. of the 6th VLDB Workshop on Secure Data Management, Lyon, France, pp. 49--67, 2009. Google ScholarDigital Library
- }}E. Elnahrawy and B. Nath, "Cleaning and Querying Noisy Sensors," In Proc. of the 2nd ACM Int'l Conf. on Wireless Sensor Networks and Applications, San Diego, California, pp. 78--87, Sept. 2003. Google ScholarDigital Library
- }}M. R. Garey and D. S. Johnson, Computers and Intractability; A Guide to the Theory of NP-Completeness, 1990. Google ScholarDigital Library
- }}P. N. Klein, "Computing the Edit-distance between Unrooted Ordered Trees," In Proc. of the 6th Annual European Symposium on Algorithms (ESA), Venice, Italy, pp 91--102, Aug. 1998. Google ScholarDigital Library
- }}Smart Dust Project, http://robotics.eecs.berkeley.edu/~pister/SmartDust/.Google Scholar
- }}M. Rabbat and R. Nowak, "Distributed Optimization in Sensor Networks," In Proc. of the 3rd Int'l Symp. on Information Processing in Sensor Networks, Berkeley, California, pp. 20--27, Apr. 2004. Google ScholarDigital Library
Index Terms
- Provenance-based trustworthiness assessment in sensor networks
Recommendations
Sensor Network Provenance Compression Using Dynamic Bayesian Networks
Provenance records the history of data acquisition and transmission. In wireless sensor networks (WSNs), provenance is critical for many different purposes, including assessing the trustworthiness of data acquired and forwarded by sensors, supporting ...
Perceived Trustworthiness Within the Organization: The Moderating Impact of Communication Frequency on Trustor and Trustee Effects
This paper investigates the antecedents of intraorganizational trust and, more specifically, how the frequency of communication between trustor and trustee moderates the impact of these factors on perceived trustworthiness. Data on 157 dyadic ...
Reflections on the dimensions of trust and trustworthiness among online consumers
Trust is emerging as a potentially central aspect leading to IT acceptance. It is especially needed in the case of gaining and later retaining consumers of online vendors. This has been shown by previous research using single dimensional constructs. But ...
Comments