Trust based Approach for Improving Data Reliability in Industrial Sensor Networks

  • Tatyana Ryutov
  • Clifford Neuman
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


The resource constraints and unattended operation of wireless sensor networks make it difficult to protect nodes against capture and compromise. While cryptographic techniques provide some protection, they do not address the complementary problem of resilience to corrupted sensor data generated by failed or compromised sensors. Trusting data from unattended sensor nodes in critical applications can have disastrous consequences. We propose a behavior-based trust mechanism to address this problem in static sensor networks, in which the location of nodes is known. We take advantage of domain knowledge which includes: (i) physical constraints imposed by the local environment where sensors are located, (ii) expectations of the monitored physical phenomena; and (iii) sensor design and deployment characteristics. The system diagnoses and isolates faulty/malicious nodes even when readings of neighboring nodes are faulty. The goal of this system is to increase work effort and capabilities required by an attacker. The framework and related techniques of behavior-based trust are discussed in this paper.


Sensor Network Sensor Node Wireless Sensor Network Malicious Node Sensor Reading 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, L. Krishnamurthy, N. Kushalnagar, L. Nachman, M. Yarvis. Design and Deployment of Industrial Sensor Networks: Experiences from the North Sea and a Semiconductor Plant, Sensys 2005.Google Scholar
  2. 2.
    C. M. Bishop, Neural Networks for Pattern Recognition, Oxford University Press, ISBN: 0198538642, 1995.Google Scholar
  3. 3.
    M. Bohge and W. Trappe. An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In Proc. of ACM workshop on Wireless Security, 2003.Google Scholar
  4. 4.
    W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, A. Khalili, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security, 2005.Google Scholar
  5. 5.
    E. Elnahrawy, and B. Nath. Context-aware sensors. In Lecture Notes in Computer Science, H. Karl, A. Willig, and A. Wolisz, Eds. Vol. 2920. Springer-Verlag, 77–93, 2004.Google Scholar
  6. 6.
    S. Ganeriwal and M. B. Srivastava, Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 66–77, 2004.Google Scholar
  7. 7.
    G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks revisited, 1st European Workshop on Security in Ad-Hoc and Sensor Networks, LNCS 3313, 2004.Google Scholar
  8. 8.
    M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, Y. C. Hu. TibFit: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In Proceedings of the International Conference on Dependable Systems and Networks, 2005.Google Scholar
  9. 9.
    B. Krishnamachari and S. Iyengar, Distributed Bayesian algorithms for faulttolerant event region detection in wireless sensor networks. IEEE Transactions on Computers, Vol. 53, No. 3, 2004.Google Scholar
  10. 10.
    B. Krishnamachari, S. Iyengar. Efficient and Fault-Tolerant Feature Extraction in Wireless Sensor Networks, Proceedings of Information Processing in Sensor Networks, 2003.Google Scholar
  11. 11.
    L. B. Larkey and A. A. Hagberg and L. M. A. Bettencourt. In-Situ Data Quality Assurance for Environmental Applications of Wireless Sensor Networks, Report LA-UR-06-1117, 2006.Google Scholar
  12. 12.
    D. Liu, Peng Ning and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In Proceedings of The Fourth International Conference on Information Processing in Sensor Networks, 2005.Google Scholar
  13. 13.
    A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks, Wireless Networks Journal, 8(5):521–534, 2002.MATHCrossRefGoogle Scholar
  14. 14.
    Pirzada and C. McDonald. Establishing trust in pure ad-hoc networks, In Proceedings of the 27th Australasian Computer Science Conference, 47–54, 2004.Google Scholar
  15. 15.
    J. R. Quinlan. Induction of decision trees. Machine Learning 1:81–106, 1986.Google Scholar
  16. 16.
    T. Ryutov, L. Zhou, N. Foukia, C. Neuman, T. Leithead, K. E. Seamons. Adaptive Trust Negotiation and Access Control for Grids. In proceedings of the Grid 6th IEEE/ACM International Workshop on Grid Computing, 2005.Google Scholar
  17. 17.
    T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. Seamons. Adaptive Trust Negotiation and Access Control. In Proceedings of SACMAT, 2005.Google Scholar
  18. 18.
    W. Trappe, Y Zhang, and B. Nath. MIAMI: Methods and Infrastructure for the Assurance of Measurement Information, In DMSN, 2005.Google Scholar
  19. 19.
    S. Q. Zhang, S J Jin, F. L Yang, X Q Wang and Q. Y. Bai. Crucial Technologies of Oil Transporting Pipe Leak Detection and Location Based on Wavelet and Chaos, 7th ISMTII2005(UK), 2005.Google Scholar
  20. 20.
    S. Zhu, S. Setia, S. Jajodia, and P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, 2004.Google Scholar
  21. 21.
    C. Zouridaki, B. L. Mark, M. Hejmo, R. K. Thomas. A quantitative trust establishment framework for reliable data packet delivery in MANETs, SASN 2005.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Tatyana Ryutov
    • 1
  • Clifford Neuman
    • 1
  1. 1.Information Sciences InstituteUniversity of Southern CaliforniaMarina del Rey

Personalised recommendations