Skip to main content

A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

  • Conference paper

Abstract

Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Giruka, V.C., Singhal, M., Royalty, J., Varanasi, S.: Security in wireless sensor networks. Wireless Comm. Mob. Comput. 8, 1–24 (2008)

    Article  Google Scholar 

  2. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Comm., 85–91 (2007)

    Google Scholar 

  3. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: IEEE Int. Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

    Google Scholar 

  4. Li, H., Singhal, M.: A Secure Routing Protocol for Wireless ad hoc Networks. In: 39th Hawaii International Conf. on system Sciences (2006)

    Google Scholar 

  5. Rezgui, A., Eltoweissy, M.: TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks. In: IEEE Int. Conf. on Mobile Adhoc and Sensor Systems (2007)

    Google Scholar 

  6. Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: Trust evaluation model for wireless sensor networks. In: Advanced Comm. Tech. Conference, ICACT 2005, pp. 491–496 (2005)

    Google Scholar 

  7. Crosby, G.V., Pissinou, N.: Cluster-based Reputation and Trust for Wireless Sensor Networks. In: Consumer Communications and Networking Conference, CCNC (2007)

    Google Scholar 

  8. Lewis, N., Foukia, N.: Using Trust for Key Distribution and Route Selection in Wireless Sensor Networks. In: IEEE Globecom 2007 (2007)

    Google Scholar 

  9. Mahoney, G., Myrvold, W., Shoja, G.C.: Generic Reliability Trust Model. In: 3rd Annual Conference on Privacy, Security and Trust (2005)

    Google Scholar 

  10. Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. In: IEEE Int. Conf. on Performance, Computing, and Communications (2004)

    Google Scholar 

  11. Ghazaleh, N., Kang, K.D., Liu, K.: Towards Resilient Geographic Routing in Wireless Sensor Networks. In: 1st ACM Workshop on QoS and Security for Wireless and Mobile Networks (2005)

    Google Scholar 

  12. Pirzada, A., McDonald, C.: Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Comm. 37, 139–163 (2006)

    Article  Google Scholar 

  13. Marias, G., Tsetsos, V., Sekkas, O., Georgiadis, P.: Performance evaluation of a self-evolving trust building framework. In: 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)

    Google Scholar 

  14. Sun, Y.L., Han, Z., Ray Liu, K.J.: Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine 25, 112–119 (2008)

    Article  Google Scholar 

  15. http://www.j-sim.org/

  16. Karp, K., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for WirelessNetworks. In: MobiCom 2000 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Stelios, Y., Papayanoulas, N., Trakadas, P., Maniatis, S., Leligou, H.C., Zahariadis, T. (2009). A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks. In: Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S. (eds) Mobile Lightweight Wireless Systems. Mobilight 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 13. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03819-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03819-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03818-1

  • Online ISBN: 978-3-642-03819-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics