无线传感器网络中的信任管理
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant No.60773163 (国家自然科学基金)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [35]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    作为对基于密码体系的安全手段的重要补充,信任管理在解决WSNs(wireless sensor networks)中的内部攻击,识别恶意节点、自私节点及低竞争力节点,提高系统安全性、可靠性和公平性等方面有着显著优势.综述了WSNs环境下信任管理的特点、分类方法、框架设计、脆弱性分析、攻击模型及对策,在此基础上介绍了WSNs下的典型信任管理系统.以信任计算模型为中心的WSNs环境下信任管理框架的设计是信任管理系统的核心,从信任要素、信任计算模型和信任值的应用这3个方面对其进行了深入讨论.最后,总结了WSNs环境下信任管理的研究现状,提出了值得参考的研究发展方向.

    Abstract:

    Cryptography based security solutions are not enough for WSNs when there are attacks from interior, which are caused by compromised nodes. Trust management can deal with this problem efficiently, and enhance the security, reliability and impartiality of the system. This paper gives a detailed introduction to the characteristics, the taxonomy, and the design of the framework, the vulnerability analysis, the attack models and the countermeasures. Among which the design of the framework, including the trust factors, the computation models and the application of trust, is the core of a trust management system and is given a deep insight into. In the end, several typical trust management systems are introduced. A panoramic view and detailed analysis of current trust based systems in WSNs are given.

    参考文献
    [1]Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.In:Dale,J,Dinolt,G,eds.Proc.of the 17th Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,1996.164-173.
    [2]Ellison CM,Franz B,Rivest R,Thomas BM,Ylonen T.Simple public key infrastructure certificate theory.IETF RFC 2693,1999.
    [3]Li NG,Mitchell JC.RT:A role-based trust-management framework.In:Werner B,ed.Proc.of the 3rd DARPA Information Survivability Conf.and Exposition (DISCEX III).Washington:IEEE Computer Society Press,2003.201-212.
    [4]Freudenthal E,Pesin T,Port L,Keenan E,Karamcheti V.dRBAC:Distributed role-based access control for dynamic coalition environments.Technical Report,TR2001-819,New York University,2001.
    [5]Li NH,Mitchell JC,Winsborough WH.Beyond proof-of-compliance:Security analysis in trust management.Journal of the ACM,2005,52(3):474-514.
    [6]Seng CY,Arbaugh WA.A secure trust establishment model.In:Werner B,ed.Proc.of the IEEE Int'l Conf.on Sensor Networks,Ubiquitous,and Trustworthy Computing (SUTC 2006).Piscataway:IEEE Computer Society,2006.78-85.
    [7]Ryutov T,Neuman C.Trust based approach for improving data reliability in industrial sensor networks.In:Etalle S,Marsh S,eds.Proc.of the IFIP Int'l Federation for Information,Vol.238.Boston:Springer-Verlag,2007.349-365.
    [8]Tanachaiwiwat S,Dave P,Bhindwale R,Helmy A.Secure locations:routing on trust and isolating compromised sensors in location-aware sensor networks.In:Proc.of the SenSys 2003.New York:ACM Press,2003.324-325.
    [9]Ganeriwal S,Srivastava M.Reputation-based framework for high integrity sensor networks.In:Proc.of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004).New York:ACM Press,2004.66-77.
    [10]Krasniewski MD,Varadharajan P,Rabeler B,Bagchi S,Hu YC.TIBFIT:Trust index based fault tolerance for ability data faults in sensor.In:Werner B,ed.Proc.of the Int'l Conf.on Dependable Systems and Networks (DSN).Piscataway:IEEE Computer Society,2005.672-681.
    [11]Crosby GV,Pissinou N,Gadze J.A framework for trust-based cluster head election in wireless sensor networks.In:Proc.of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS 2006).Piscataway:IEEE Computer Society,2006.13-22.
    [12]Huang L,Li L,Tan Q.Behavior-Based trust in wireless sensor network.In:Shen HT,Li JB,Li ML,Ni J,Wang W,eds.Proc.of the APWeb Workshops 2006.LNCS 3842,Berlin,Heidelberg:Springer-Verlag,2006.214-223.
    [13]Cheng WF,Liao XK,Shen CX,Li SS,Peng SL.A trust-based routing framework in energy-constrained wireless sensor networks.In:Cheng XZ,Li W,Znati T,eds.Proc.of the WASA 2006.LNCS 4138,Berlin,Heidelberg:Springer-Verlag,2006.478-489.
    [14]Yu B,Chen HG,Yang M,Mao DL,Gao CS.A key management scheme for cross-layering designs in wireless sensor networks.In:Pan Y,Chen DX,Guo MY,Cao JN,Dongarra J,eds.Proc.of the ISPA 2005.LNCS 3758,Berlin,Heidelberg:Springer-Verlag,2005.757-768.
    [15]Yin ZY,Zhao H,Lin K,Sun PG,Luo D,Zhang XY,Wang XY.A coverage-preserving node scheduling scheme based on trust selection model in wireless sensor networks.In:Proc.of the 1st Int'l Symp.on Pervasive Computing and Applications.Piscataway:IEEE Computer Society,2006.696-698.
    [16]Xu MD,Du RY,Zhang HG.A new hierarchical trusted model for wireless sensor networks.In:Proc.of Computational Intelligence and Security (CIS).Piscataway:IEEE Computer Society,2006.1541-1544.
    [17]Shaikh RA,Jameel H,Lee S,Rajput S,Song YJ.Trust management problem in distributed wireless sensor networks.In:Proc.of the RTCSA.Piscataway:IEEE Computer Society,2006.411-414.
    [18]Tanachaiwiwat S,Dave P,Bhindwale R,Helmy A.Location-Centric isolation of misbehavior and trust routing in energy-constrained sensor networks.In:Hassanein H,Oliver RL,Richard III GG,Wilson LF,eds.Proc.of the IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN).Piscataway:IEEE Computer Society,2004.463-469.
    [19]Yao ZY,Kim DY,Lee I.A security framework with trust management for sensor networks.In:Proc.of the 1st IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks Athens.Piscataway:IEEE Computer Society,2005.190-198.
    [20]Hur J,Lee Y,Hong SM,Yoon H.Trust management for resilient wireless sensor networks.In:Won DH,Kim SJ,eds.Proc.of the ICISC 2005.LNCS 3935,Berlin,Heidelberg:Springer-Verlag,2006.56-68.
    [21]Hur J,Lee Y,Yoon H,Choi D,Jun S.Trust evaluation model for wireless sensor networks.In:Proc.of the ICACT 2005.Piscataway:IEEE Computer Society,2005.491-496.
    [22]BoukercheA,Xu Li.ATRM:An agent-based trust and reputation management scheme for wireless sensor networks.In:Global Telecommunications Conf.(GLOBECOM).New York:IEEE,2005.1857-1861.
    [23]Grandison T,Sloman M.A survey of trust in Internet application.IEEE Communications Surveys and Tutorials,2000,3(4):2-16.
    [24]Agah A,Das SK,Basu K.A game theory based approach for security in wireless sensor networks.In:Hassanein H,Oliver RL,Richard III GG,Wilson LF,eds.Proc.of the IEEE Int'l Conf.on Performance,Computing and Communications.Piscataway:IEEE Computer Society,2004.259-263.
    [25]Zhang W,Das SK,Liu YH.A trust based framework for secure data aggregation in wireless sensor networks.In:Proc.of the IEEE SECON 2006.Piscataway:IEEE Computer Society,2006.60-69.
    [26]Roosta T,Meingast M,Sastry S.Distributed reputation system for tracking applications in sensor networks.In:Proc.of the 3rd Annual Int'l Conf.on Mobile and Ubiquitous Systems:Networking & Services.IEEE,2006.1-8.
    [27]Yao ZY,Kim D,Doh Y.PLUS:Parameterized and localized trust management scheme for sensor networks security.In:Proc.of the IEEE Int'l Conf.on Mobile Adhoc and Sensor Systems (MASS).Piscataway:IEEE Computer Society,2006.437-446.
    [28]Hsieh MY,Huang YM,Chao HC.Adaptive security design with malicious node detection in cluster-based sensor networks.Computer Communications,2007,30(11):2385-2400.
    [29]Probst MJ,Kasera SK.Statistical trust establishment in wireless sensor networks.In:Proc.of the Int'l Conf.on Parallel and Distributed Systems.IEEE Computer Society,2007.1-8.
    [30]Slijepcevic S,Tsiatsis V,Zimbeck S,Potkonjak M,Srivastava MB.On communication security in wireless ad-hoc sensor networks.In:Proc.of the 11th IEEE Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprise (WETICE 2002).Washington:IEEE Computer Society,2002.139-144.
    [31]Anderson R,Chan H,Perrig A.Key infection:Smart trust for smart dust.In:Proc.of the 12th IEEE Int'l Conf.on Network Protocols (ICNP 2004).Los Alamitos:IEEE Computer Society,2004.206-215
    [32]Page L,Brin S,Motwani R,Winograd T.The pagerank citation ranking:Bringing order to the Web.In:Stanford Digital Library Technologies Project.1998.http://dbpubs.stanford.edu/pub/1999-66
    [33]Kamvar SD,Schlosser MT,Garcia-Molina H.The eigentrust algorithm for reputation management in P2P networks.In:Proc.of the 12th Int'l World Wide Web Conf.New York:ACM Press,2003.640-651.
    [34]http://cartel.csail.mit.edu/
    [35]http://research.cens.ucla.edu/areas/2007/Urban_Sensing
    引证文献
引用本文

荆 琦,唐礼勇,陈 钟.无线传感器网络中的信任管理.软件学报,2008,19(7):1716-1730

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2007-10-12
  • 最后修改日期:2008-03-27
文章二维码
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号