Abstract
The resource constraints of wireless sensor network make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Behavior-based trust mechanism, which is a variant of reputation-based trust in eCommerce, can be used to address this problem. The framework and related techniques of behavior-based trust are discussed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Grandison, T., Sloman, M.: Imperial Colege, A Survey of Trust in INTERNET Applications. IEEE Communications Surveys Fourth Quarter (2000), http://www.comsoc.org/pubs/surveys
Li, X., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: Proceedings of the ACM Conference on Electronic Commerce, pp. 228–229 (2003)
Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)
Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security, TISSEC (2005)
Kalidindi, R., Paruchuri, V.: Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks. In: Proceedings of the International Conference on Wireless networks (ICWN 2004), pp. 440–446 (2004)
Anderson, R., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: IEEE International Conference on Network Protocols, ICNP (2004)
Vijay, B., Ajay, G., Pidva, R.: A distributed approach to security in sensornets. In: IEEE 58th Vehicular Technology Conference, pp. 3010–3014 (2003)
Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight Key Management for Secure Wireless Sensor Networks. In: IEEE Workshop on Multi-hop Wireless Networks (2004)
Perrig, A., Szewczyk, R., Tygar, D., Wen, V., Culler, D.: Culler: SPINS: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy (2004)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)
Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: International Conferecnce on Web Information System Engineering (WiSe 2003) (2003)
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications (WSNA 2003), pp. 141–150 (2003)
Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003) (2003)
Tanachaiwiwat, S., Dave, P., Bhindwale, R.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained sensor networks. In: IEEE Workshop on Energy-Efficient Wireless Communications and Networks, EWCN 2004 (2004)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on Wireless security, pp. 21–30 (2002)
Marti, S., Iuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 255–265 (2000)
Ren, Q., Liang, Q.: Secure media access control (MAC) in Wireless Sensor Networks: Intrusion detections and countermeasures. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 3025–3029 (2004)
Elnahrawy, E., Nath, B.: Context_Aware Sensors. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 77–93. Springer, Heidelberg (2004)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on Wireless security, pp. 21–30 (2002)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE INFOCOM 2004 (2004)
Bartosz, P., Dawn, S., Adrian, P.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the First International Conference on Embedded Networked Sensor Systems, pp. 255–265 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A Witness-Based approach For Data Fusion Assuranc. In: Wireless Sensor Networks. Global Communications Conference, GLOBECOM (2003)
Shafer, G.: A mathematical theory of evidence. Princeton University, Princeton (1976)
Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004 (2004)
Siaterlis, C., Maglaris, B.: Towards Multisensor Data Fusion for DoS detection. In: International Workshop on Selected Areas in Cryptography, SAC 2004 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, L., Li, L., Tan, Q. (2006). Behavior-Based Trust in Wireless Sensor Network. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_27
Download citation
DOI: https://doi.org/10.1007/11610496_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)