Skip to main content

Behavior-Based Trust in Wireless Sensor Network

  • Conference paper
Advanced Web and Network Technologies, and Applications (APWeb 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3842))

Included in the following conference series:

Abstract

The resource constraints of wireless sensor network make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Behavior-based trust mechanism, which is a variant of reputation-based trust in eCommerce, can be used to address this problem. The framework and related techniques of behavior-based trust are discussed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Grandison, T., Sloman, M.: Imperial Colege, A Survey of Trust in INTERNET Applications. IEEE Communications Surveys Fourth Quarter (2000), http://www.comsoc.org/pubs/surveys

  2. Li, X., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: Proceedings of the ACM Conference on Electronic Commerce, pp. 228–229 (2003)

    Google Scholar 

  3. Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)

    Google Scholar 

  5. Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security, TISSEC (2005)

    Google Scholar 

  6. Kalidindi, R., Paruchuri, V.: Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks. In: Proceedings of the International Conference on Wireless networks (ICWN 2004), pp. 440–446 (2004)

    Google Scholar 

  7. Anderson, R., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: IEEE International Conference on Network Protocols, ICNP (2004)

    Google Scholar 

  8. Vijay, B., Ajay, G., Pidva, R.: A distributed approach to security in sensornets. In: IEEE 58th Vehicular Technology Conference, pp. 3010–3014 (2003)

    Google Scholar 

  9. Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight Key Management for Secure Wireless Sensor Networks. In: IEEE Workshop on Multi-hop Wireless Networks (2004)

    Google Scholar 

  10. Perrig, A., Szewczyk, R., Tygar, D., Wen, V., Culler, D.: Culler: SPINS: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  11. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy (2004)

    Google Scholar 

  12. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)

    Google Scholar 

  13. Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: International Conferecnce on Web Information System Engineering (WiSe 2003) (2003)

    Google Scholar 

  14. Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications (WSNA 2003), pp. 141–150 (2003)

    Google Scholar 

  15. Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003) (2003)

    Google Scholar 

  16. Tanachaiwiwat, S., Dave, P., Bhindwale, R.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained sensor networks. In: IEEE Workshop on Energy-Efficient Wireless Communications and Networks, EWCN 2004 (2004)

    Google Scholar 

  17. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on Wireless security, pp. 21–30 (2002)

    Google Scholar 

  18. Marti, S., Iuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 255–265 (2000)

    Google Scholar 

  19. Ren, Q., Liang, Q.: Secure media access control (MAC) in Wireless Sensor Networks: Intrusion detections and countermeasures. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 3025–3029 (2004)

    Google Scholar 

  20. Elnahrawy, E., Nath, B.: Context_Aware Sensors. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 77–93. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on Wireless security, pp. 21–30 (2002)

    Google Scholar 

  22. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE INFOCOM 2004 (2004)

    Google Scholar 

  23. Bartosz, P., Dawn, S., Adrian, P.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the First International Conference on Embedded Networked Sensor Systems, pp. 255–265 (2003)

    Google Scholar 

  24. Du, W., Deng, J., Han, Y.S., Varshney, P.: A Witness-Based approach For Data Fusion Assuranc. In: Wireless Sensor Networks. Global Communications Conference, GLOBECOM (2003)

    Google Scholar 

  25. Shafer, G.: A mathematical theory of evidence. Princeton University, Princeton (1976)

    MATH  Google Scholar 

  26. Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004 (2004)

    Google Scholar 

  27. Siaterlis, C., Maglaris, B.: Towards Multisensor Data Fusion for DoS detection. In: International Workshop on Selected Areas in Cryptography, SAC 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, L., Li, L., Tan, Q. (2006). Behavior-Based Trust in Wireless Sensor Network. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_27

Download citation

  • DOI: https://doi.org/10.1007/11610496_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31158-4

  • Online ISBN: 978-3-540-32435-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics