top
Articles
  • OpenAccess
  • Scalable Trust-Based Secure WSNs  [CSN 2014]
  • DOI: 10.4236/jcc.2014.27003   PP.17 - 22
  • Author(s)
  • Amar Agrawal, Ruizhong Wei
  • ABSTRACT
  • In this paper, we consider the scalable of wireless sensor networks with trust-based security. In our setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic algorithms are not allowed. We focus on the scalability of the network and proposed new testing algorithms and evaluation algorithms to test new nodes added, which give them reasonable values of trust. Based on these algorithms, we proposed new components for trust management system of wireless sensor networks.

  • KEYWORDS
  • Trust-Based Security, Wireless Sensor Network, Trust Management
  • References
  • [1]
    Huang,L., Li, L.and Tan,Q. (2006) Behavior-BasedTrust in Wireless Sensor Network.Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications, 214-223.
    [2]
    Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proceedingsof the 6th Annual International Conference on Mobile Computing and Networking, 255-265.
    [3]
    Ganeriwal, S., Balzano, L.K. and Srivastava, M.B. (2008) Reputation-Based Framework for High Integrity Sensor Networks.ACM Transactions on Sensor Networks (TOSN), 4, Article No. 15.
    http://dx.doi.org/10.1145/1362542.1362546
    [4]
    Aivaloglou, E. and Gritzalis, S. (2010) Hybrid Trust and Reputation Management for Sensor Networks. Wireless Networks, 16, 1493-1510.
    http://dx.doi.org/10.1007/s11276-009-0216-8
    [5]
    Bao, F., Chen, I.-R., Chang, M.J. and Cho, J.-H. (2012) Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.IEEE Transactions on Network and Service Management, 9, 169-183.
    http://dx.doi.org/10.1109/TCOMM.2012.031912.110179
    [6]
    Lopez, J., Roman, R., Agudo, I. and Fernandez-Gago, C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33, 1086-1093.
    http://dx.doi.org/10.1016/j.comcom.2010.02.006
    [7]
    Chen, X., Makki, K., Yen, K. and Pissinou, N. (2009) Sensor Network Security: A Survey. IEEE Communications Surveys Tutorials, 11, 52-73.
    http://dx.doi.org/10.1109/SURV.2009.090205
    [8]
    Cho, J.H., Swami, A. and Chen, I.R. (2011) A Survey on Trust Management for Mobile and Ad Hoc Networks.IEEE Communications Surveys Tutorials, 13, 562-583.
    http://dx.doi.org/10.1109/SURV.2011.092110.00088
    [9]
    Hu, W., Corke, P., Ship, W. C. and Overs, L. (2009) sec-Fleck: A Public Key Technology Platform for Wireless Sensor Networks. In: Roedig, U. and Sreenan, C.J., Eds., EWSN 2009, LNCS5432, 296-311.
    [10]
    W. Hu, et al. (2010) Toward Trusted Wireless Sensor Networks.ACM Transactions on Sensor Networks, 7, 1-25.
    http://dx.doi.org/10.1145/1806895.1806900
    [11]
    Yissoff, Y.M. and Hashim, H. (2010) Trusted Wireless Sensor Node Platform. Proceedings of the World Congress on Engineering 2010, London, 774-779.
    [12]
    Velloso, P.B., et al. (2010) Trust Management in Mobile ad Hoc Networks Using a Scalable Maturity-Based Model. IEEE Transactions on Network and Service Management, 7, 172-185.
    http://dx.doi.org/10.1109/TNSM.2010.1009.I9P0339

Engineering Information Institute is the member of/source content provider to

http://www.scirp.org http://www.hanspub.org/ http://www.crossref.org/index.html http://www.oalib.com/ http://www.ebscohost.com/ http://www.proquest.co.uk/en-UK/aboutus/default.shtml http://ip-science.thomsonreuters.com/cgi-bin/jrnlst/jlresults.cgi?PC=MASTER&Full=journal%20of%20Bioequivalence%20%26%20Bioavailability http://publishers.indexcopernicus.com/index.php