skip to main content
10.1145/1858158.1858162acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdmsnConference Proceedingsconference-collections
research-article

Provenance-based trustworthiness assessment in sensor networks

Published:13 September 2010Publication History

ABSTRACT

As sensor networks are being increasingly deployed in decision-making infrastructures such as battlefield monitoring systems and SCADA (Supervisory Control and Data Acquisition) systems, making decision makers aware of the trustworthiness of the collected data is a crucial. To address this problem, we propose a systematic method for assessing the trustworthiness of data items. Our approach uses the data provenance as well as their values in computing trust scores, that is, quantitative measures of trustworthiness. To obtain trust scores, we propose a cyclic framework which well reflects the inter-dependency property: the trust score of the data affects the trust score of the network nodes that created and manipulated the data, and vice-versa. The trust scores of data items are computed from their value similarity and provenance similarity. The value similarity comes from the principle that "the more similar values for the same event, the higher the trust scores". The provenance similarity is based on the principle that "the more different data provenances with similar values, the higher the trust scores". Experimental results show that our approach provides a practical solution for trustworthiness assessment in sensor networks.

References

  1. }}E. Bertino, C. Dai, H.-S. Lim, and D. Lin, "High-Assurance Integrity Techniques for Databases," In Proc. of the 25th British Nat'l Conf. on Databases, Cardiff, UK, pp. 244--256, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}C. Dai, D. Lin, E. Bertino, and M. Kantarcioglu, "An Approach to Evaluate Data Trustworthiness Based on Data Provenance," In Proc. of the 5th VLDB Workshop on Secure Data Management, Auckland, New Zealand, pp. 82--98, Aug. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}C. Dai et al., "Query Processing Techniques for Compliance with Data Confidence Policies," In Proc. of the 6th VLDB Workshop on Secure Data Management, Lyon, France, pp. 49--67, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}E. Elnahrawy and B. Nath, "Cleaning and Querying Noisy Sensors," In Proc. of the 2nd ACM Int'l Conf. on Wireless Sensor Networks and Applications, San Diego, California, pp. 78--87, Sept. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. }}M. R. Garey and D. S. Johnson, Computers and Intractability; A Guide to the Theory of NP-Completeness, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}P. N. Klein, "Computing the Edit-distance between Unrooted Ordered Trees," In Proc. of the 6th Annual European Symposium on Algorithms (ESA), Venice, Italy, pp 91--102, Aug. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}Smart Dust Project, http://robotics.eecs.berkeley.edu/~pister/SmartDust/.Google ScholarGoogle Scholar
  8. }}M. Rabbat and R. Nowak, "Distributed Optimization in Sensor Networks," In Proc. of the 3rd Int'l Symp. on Information Processing in Sensor Networks, Berkeley, California, pp. 20--27, Apr. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Provenance-based trustworthiness assessment in sensor networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      DMSN '10: Proceedings of the Seventh International Workshop on Data Management for Sensor Networks
      September 2010
      45 pages
      ISBN:9781450304160
      DOI:10.1145/1858158

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate6of16submissions,38%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader