Trust-based secure aggregation in wireless sensor networks

被引:0
|
作者
Hur, Junbeom [1 ]
Lee, Yoonho [1 ]
Hong, Seongmin [1 ]
Yoon, Hyunsoo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Div Comp Sci, Taejon 305701, South Korea
关键词
resilient sensor networks; trust evaluation; security; secure aggregation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devices are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data Into the networks to make the networks be In confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and filter out malicious nodes' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks incipiently beyond standard authentication mechanisms and conventional key management schemes.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [1] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    [J]. 2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [2] An Intra-Cluster Trust-Based Secure Data Aggregation Framework for Wireless Sensor Networks
    Makin, Bhavna Arora
    Prof Devanand
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2011, 2 (01): : 75 - 88
  • [3] Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach
    Reddy, Yenumula B.
    Selmic, Rastko
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 218 - 223
  • [4] Secure Data Aggregation Algorithm Based on Trust in Wireless Sensor Networks
    Guo, Rui
    [J]. 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 809 - 813
  • [5] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [6] A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks
    Zhou, Ming-Zheng
    Xu, Jin-Sheng
    Zhu, Cheng
    [J]. SEC 2008: PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING, 2008, : 61 - 66
  • [7] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [8] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [9] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [10] A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks
    Sun, Yan
    Luo, Hong
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 785 - 797