Trust-based framework for security enhancement of wireless sensor

被引:0
|
作者
Oleshchuk, Vladimir [1 ]
机构
[1] Agder Univ Coll, Grimstad, Norway
关键词
trust-awareness; sensor networks; ad-hoc networks; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we demonstrate how the concept of trust can be used to increase security in wireless sensor networks. Since because of limited resources the traditional approach to security based on cryptography is not always can be utilized in secure sensor networks, we consider the way of protecting such networks by taking into consideration trustworthiness of individual sensors. We show how trustworthiness of sensors can be calculated and maintained dynamically based on monitoring sensors' activities. In proposed approach we use the subjective logic as the trust metric. We argue that when there are requirements to trustworthiness of gathered data from sensors the security can be improved even without using cryptography.
引用
收藏
页码:623 / 627
页数:5
相关论文
共 50 条
  • [1] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [2] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [3] A framework for trust-based cluster head election in wireless sensor networks
    Crosby, Garth V.
    Pissinou, Niki
    Gadze, James
    [J]. DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, 2006, : 13 - +
  • [4] A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks
    Pandey, Divya
    Kushwaha, Vandana
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2022, 54 (3-4) : 249 - 290
  • [5] A trust-based routing framework in energy-constrained wireless sensor networks
    Cheng Weifang
    Liao Xiangke
    Shen Changxiang
    Li Shanshan
    Peng Shaoliang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 478 - 489
  • [6] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [7] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    [J]. International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [8] Trust-based Anonymity Framework for Wireless Mesh Networks
    Siddiqui, Muhammad Shoaib
    Shaikh, Riaz Ahmed
    Hong, Choong Seon
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1638 - 1642
  • [9] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [10] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39