Trust Management for Resilient Wireless Sensor Networks

  • Junbeom Hur
  • Younho Lee
  • Seong-Min Hong
  • Hyunsoo Yoon
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)


Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.


Sensor Network Sensor Node Wireless Sensor Network Neighbor Node Malicious Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer (2003)Google Scholar
  2. 2.
    Pirzada, A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. In: Proceedings of the 27th conference on Australasian computer science (2004)Google Scholar
  3. 3.
    Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communication of the ACM (June 2004)Google Scholar
  4. 4.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. NEST (2003)Google Scholar
  5. 5.
    Yan, Z., Zhang, P., Virtanen, T.: Trust Evaluation Based Security Solution in Ad Hoc Networks. In: NordSec 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems, October 15th-17th (2003)Google Scholar
  6. 6.
    Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: Proceedings of the 2003 ACM workshop on Wireless security (2003)Google Scholar
  7. 7.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks, SenSys 2003 (2003)Google Scholar
  8. 8.
    Krishnamachari, B., Estrin, D., Wicker, S.: The Impact of Data Aggregation in Wireless Sensor Networks. In: ICDCSW, Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 575–578 (2002)Google Scholar
  9. 9.
    Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Conference on Computer and Communications Security, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 83–93 (2003)Google Scholar
  10. 10.
    Doumit, S.S., Agrawal, D.P.: Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks. In: Military Communications Conference, 2003. MILCOM 2003, pp. 609–614. IEEE, Los Alamitos (2003)CrossRefGoogle Scholar
  11. 11.
    Eschenauer, L., Gilgor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press, New York (2002)Google Scholar
  12. 12.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkely, California, May 11-14, pp. 197–213 (2003)Google Scholar
  13. 13.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31, pp. 42–51 (2003)Google Scholar
  14. 14.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINE) (September 2002)Google Scholar
  15. 15.
    Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Workshop on Security and Assurance in Ad hoc Networks (January 2003)Google Scholar
  16. 16.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California (May 2004)Google Scholar
  17. 17.
    Ye, F., Luo, H., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. Proceedings of IEEE INFOCOM (2004)Google Scholar
  18. 18.
    Wagner, D.: Resilient Aggregation in Sensor Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), October 25 (2004)Google Scholar
  19. 19.
    Shrivastava, N., Buragohain, C., Agrawal, D., Suri, S.: Medians and Beyond: New Aggregation Techniques for Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 16 (2004)Google Scholar
  20. 20.
    Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: IPSN 2005, Los Angeles (April 2005)Google Scholar
  21. 21.
    Ji, X., Zha, H.: Robust Sensor Localization Algorithm in Wireless Ad-hoc Sensor Networks. In: Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 2003) (2003)Google Scholar
  22. 22.
    Lazos, L., Poovendran, R.: SeRLoc: Secure Range-Independent Localiztion for Wireless Sensor Networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security, pp. 21–30 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Junbeom Hur
    • 1
  • Younho Lee
    • 1
  • Seong-Min Hong
    • 1
  • Hyunsoo Yoon
    • 1
  1. 1.Korea Advanced Institute of Science and Technology (KAIST)South Korea

Personalised recommendations