• Article
  • | |
  • Metrics
  • |
  • Reference [35]
  • |
  • Related [20]
  • |
  • Cited by [20]
  • | |
  • Comments
    Abstract:

    Cryptography based security solutions are not enough for WSNs when there are attacks from interior, which are caused by compromised nodes. Trust management can deal with this problem efficiently, and enhance the security, reliability and impartiality of the system. This paper gives a detailed introduction to the characteristics, the taxonomy, and the design of the framework, the vulnerability analysis, the attack models and the countermeasures. Among which the design of the framework, including the trust factors, the computation models and the application of trust, is the core of a trust management system and is given a deep insight into. In the end, several typical trust management systems are introduced. A panoramic view and detailed analysis of current trust based systems in WSNs are given.

    Reference
    [1]Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.In:Dale,J,Dinolt,G,eds.Proc.of the 17th Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,1996.164-173.
    [2]Ellison CM,Franz B,Rivest R,Thomas BM,Ylonen T.Simple public key infrastructure certificate theory.IETF RFC 2693,1999.
    [3]Li NG,Mitchell JC.RT:A role-based trust-management framework.In:Werner B,ed.Proc.of the 3rd DARPA Information Survivability Conf.and Exposition (DISCEX III).Washington:IEEE Computer Society Press,2003.201-212.
    [4]Freudenthal E,Pesin T,Port L,Keenan E,Karamcheti V.dRBAC:Distributed role-based access control for dynamic coalition environments.Technical Report,TR2001-819,New York University,2001.
    [5]Li NH,Mitchell JC,Winsborough WH.Beyond proof-of-compliance:Security analysis in trust management.Journal of the ACM,2005,52(3):474-514.
    [6]Seng CY,Arbaugh WA.A secure trust establishment model.In:Werner B,ed.Proc.of the IEEE Int'l Conf.on Sensor Networks,Ubiquitous,and Trustworthy Computing (SUTC 2006).Piscataway:IEEE Computer Society,2006.78-85.
    [7]Ryutov T,Neuman C.Trust based approach for improving data reliability in industrial sensor networks.In:Etalle S,Marsh S,eds.Proc.of the IFIP Int'l Federation for Information,Vol.238.Boston:Springer-Verlag,2007.349-365.
    [8]Tanachaiwiwat S,Dave P,Bhindwale R,Helmy A.Secure locations:routing on trust and isolating compromised sensors in location-aware sensor networks.In:Proc.of the SenSys 2003.New York:ACM Press,2003.324-325.
    [9]Ganeriwal S,Srivastava M.Reputation-based framework for high integrity sensor networks.In:Proc.of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004).New York:ACM Press,2004.66-77.
    [10]Krasniewski MD,Varadharajan P,Rabeler B,Bagchi S,Hu YC.TIBFIT:Trust index based fault tolerance for ability data faults in sensor.In:Werner B,ed.Proc.of the Int'l Conf.on Dependable Systems and Networks (DSN).Piscataway:IEEE Computer Society,2005.672-681.
    [11]Crosby GV,Pissinou N,Gadze J.A framework for trust-based cluster head election in wireless sensor networks.In:Proc.of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS 2006).Piscataway:IEEE Computer Society,2006.13-22.
    [12]Huang L,Li L,Tan Q.Behavior-Based trust in wireless sensor network.In:Shen HT,Li JB,Li ML,Ni J,Wang W,eds.Proc.of the APWeb Workshops 2006.LNCS 3842,Berlin,Heidelberg:Springer-Verlag,2006.214-223.
    [13]Cheng WF,Liao XK,Shen CX,Li SS,Peng SL.A trust-based routing framework in energy-constrained wireless sensor networks.In:Cheng XZ,Li W,Znati T,eds.Proc.of the WASA 2006.LNCS 4138,Berlin,Heidelberg:Springer-Verlag,2006.478-489.
    [14]Yu B,Chen HG,Yang M,Mao DL,Gao CS.A key management scheme for cross-layering designs in wireless sensor networks.In:Pan Y,Chen DX,Guo MY,Cao JN,Dongarra J,eds.Proc.of the ISPA 2005.LNCS 3758,Berlin,Heidelberg:Springer-Verlag,2005.757-768.
    [15]Yin ZY,Zhao H,Lin K,Sun PG,Luo D,Zhang XY,Wang XY.A coverage-preserving node scheduling scheme based on trust selection model in wireless sensor networks.In:Proc.of the 1st Int'l Symp.on Pervasive Computing and Applications.Piscataway:IEEE Computer Society,2006.696-698.
    [16]Xu MD,Du RY,Zhang HG.A new hierarchical trusted model for wireless sensor networks.In:Proc.of Computational Intelligence and Security (CIS).Piscataway:IEEE Computer Society,2006.1541-1544.
    [17]Shaikh RA,Jameel H,Lee S,Rajput S,Song YJ.Trust management problem in distributed wireless sensor networks.In:Proc.of the RTCSA.Piscataway:IEEE Computer Society,2006.411-414.
    [18]Tanachaiwiwat S,Dave P,Bhindwale R,Helmy A.Location-Centric isolation of misbehavior and trust routing in energy-constrained sensor networks.In:Hassanein H,Oliver RL,Richard III GG,Wilson LF,eds.Proc.of the IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN).Piscataway:IEEE Computer Society,2004.463-469.
    [19]Yao ZY,Kim DY,Lee I.A security framework with trust management for sensor networks.In:Proc.of the 1st IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks Athens.Piscataway:IEEE Computer Society,2005.190-198.
    [20]Hur J,Lee Y,Hong SM,Yoon H.Trust management for resilient wireless sensor networks.In:Won DH,Kim SJ,eds.Proc.of the ICISC 2005.LNCS 3935,Berlin,Heidelberg:Springer-Verlag,2006.56-68.
    [21]Hur J,Lee Y,Yoon H,Choi D,Jun S.Trust evaluation model for wireless sensor networks.In:Proc.of the ICACT 2005.Piscataway:IEEE Computer Society,2005.491-496.
    [22]BoukercheA,Xu Li.ATRM:An agent-based trust and reputation management scheme for wireless sensor networks.In:Global Telecommunications Conf.(GLOBECOM).New York:IEEE,2005.1857-1861.
    [23]Grandison T,Sloman M.A survey of trust in Internet application.IEEE Communications Surveys and Tutorials,2000,3(4):2-16.
    [24]Agah A,Das SK,Basu K.A game theory based approach for security in wireless sensor networks.In:Hassanein H,Oliver RL,Richard III GG,Wilson LF,eds.Proc.of the IEEE Int'l Conf.on Performance,Computing and Communications.Piscataway:IEEE Computer Society,2004.259-263.
    [25]Zhang W,Das SK,Liu YH.A trust based framework for secure data aggregation in wireless sensor networks.In:Proc.of the IEEE SECON 2006.Piscataway:IEEE Computer Society,2006.60-69.
    [26]Roosta T,Meingast M,Sastry S.Distributed reputation system for tracking applications in sensor networks.In:Proc.of the 3rd Annual Int'l Conf.on Mobile and Ubiquitous Systems:Networking & Services.IEEE,2006.1-8.
    [27]Yao ZY,Kim D,Doh Y.PLUS:Parameterized and localized trust management scheme for sensor networks security.In:Proc.of the IEEE Int'l Conf.on Mobile Adhoc and Sensor Systems (MASS).Piscataway:IEEE Computer Society,2006.437-446.
    [28]Hsieh MY,Huang YM,Chao HC.Adaptive security design with malicious node detection in cluster-based sensor networks.Computer Communications,2007,30(11):2385-2400.
    [29]Probst MJ,Kasera SK.Statistical trust establishment in wireless sensor networks.In:Proc.of the Int'l Conf.on Parallel and Distributed Systems.IEEE Computer Society,2007.1-8.
    [30]Slijepcevic S,Tsiatsis V,Zimbeck S,Potkonjak M,Srivastava MB.On communication security in wireless ad-hoc sensor networks.In:Proc.of the 11th IEEE Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprise (WETICE 2002).Washington:IEEE Computer Society,2002.139-144.
    [31]Anderson R,Chan H,Perrig A.Key infection:Smart trust for smart dust.In:Proc.of the 12th IEEE Int'l Conf.on Network Protocols (ICNP 2004).Los Alamitos:IEEE Computer Society,2004.206-215
    [32]Page L,Brin S,Motwani R,Winograd T.The pagerank citation ranking:Bringing order to the Web.In:Stanford Digital Library Technologies Project.1998.http://dbpubs.stanford.edu/pub/1999-66
    [33]Kamvar SD,Schlosser MT,Garcia-Molina H.The eigentrust algorithm for reputation management in P2P networks.In:Proc.of the 12th Int'l World Wide Web Conf.New York:ACM Press,2003.640-651.
    [34]http://cartel.csail.mit.edu/
    [35]http://research.cens.ucla.edu/areas/2007/Urban_Sensing
    Comments
    Comments
    分享到微博
    Submit
Get Citation

荆 琦,唐礼勇,陈 钟.无线传感器网络中的信任管理.软件学报,2008,19(7):1716-1730

Copy
Share
Article Metrics
  • Abstract:9277
  • PDF: 14093
  • HTML: 0
  • Cited by: 0
History
  • Received:October 12,2007
  • Revised:March 27,2008
You are the first2033213Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063