Trust Management Method for Wireless Sensor Networks - Publication - Bridge of Knowledge

Search

Trust Management Method for Wireless Sensor Networks

Abstract

A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet submarines. Currently, WSN are viewed as one of the most important technologies for the 21st century [1]. European Union supports programmes connected with WSN utilization and China have involved WSNs in their national strategic research programmes [2]. The commercialization of WSNs are also being accelerated by companies [3]. As the WSN are part of variety complex systems, it become important to ensure security of these networks. Copying the best practices from the conventional networks is not practical as sensor nodes are subjected to severe limitations of their resources and cannot afford running sophisticated security mechanisms which are often significantly resource consuming. To cope with this problem, the concepts of trust and trustworthiness are employed. Trust management provides for distinguishing between trustworthy and untrustworthy nodes which enables collaborative decisions leading to isolation and exclusion of the nodes with a very low level of trust. It allows to improve the security of the network using fewer resources comparing to security mechanisms used in conventional networks. It this dissertation a new trust management method for distributed wireless sensor networks called WCT2M is presented and its performance analysed. It is explained how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected to the analyses with the help of a specially created laboratory and a dedicated WCT2M simulator. The results of conducted experiments allow to ascertain, that the proposed method reliably and efficiently recognizes untrusted nodes and prevent information from these nodes to spread in the network, using reasonable amount of resources.

Cite as

Full text

download paper
downloaded 478 times
Publication version
Accepted or Published Version
License
Copyright (Author(s))

Keywords

Details

Category:
Thesis, nostrification
Type:
praca doktorska pracowników zatrudnionych w PG oraz studentów studium doktoranckiego
Publication year:
2017
Bibliography: test
  1. P. Coy and N. Gross, "21 Ideas for the 21st Century," Business Week, p. 82, 30 08 1999. open in new tab
  2. L. M. Ni, "China's national research project on wireless sensor networks," Proc. of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'08), 2008. open in new tab
  3. Q. Wang and I. Balasingham, "Wireless Sensor Networks -An Introduction," Wireless Sensor Networks: Application-Centric Design, 2010. open in new tab
  4. I. Wikimedia Foundation, "Wireless sensor network," [Online].
  5. N. P. Mahalik, "Preface," in Sensor Networks and Configuration, Springer, 2007. open in new tab
  6. I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, vol. 40, no. 8, 2002. open in new tab
  7. D.-S. Kim and S. Y. Shin, "Wireless Pet Dog Management Systems," in Sensor Networks and Configuration, Springer, 2007. open in new tab
  8. Y. Wang and Y. Tseng, "Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks," 2006. open in new tab
  9. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe and I. Seskar, "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," USENIX Security 2010, 2010. open in new tab
  10. Y. Zhiyng, K. Daeyoung, L. Insun, K. Kiyoung and J. Jongsoo, "A Security Framework with Trust Management for Sensor Networks," IEEE SecureComm, 5-9 Sept. 2005.
  11. Institute of Electrical and Electronics Engineers, Inc., "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR- WPANs)," IEEE Press, New York, 2003. open in new tab
  12. ZigBee Alliance, "ZigBee Home Automation Public Application Profile specification," 2007. open in new tab
  13. J. Górski et al., "Angel System Specification," "Angel project report: Angel System Specification", Deliverable 1.2., ANGEL Project, 2007.
  14. Eclipse Foundation, "Eclipse," [Online]. Available: http://www.eclipse.org/. [Accessed 03 07 2014]. open in new tab
  15. Oracle Corporation, "Welcome to NetBeans," [Online]. Available: https://netbeans.org. [Accessed 05 02 2015]. open in new tab
  16. Oracle, "Java," [Online]. Available: http://www.java.com. [Accessed 06 07 2014].
  17. JGraph Ltd, "JGraph," [Online]. Available: http://www.jgraph.com/. [Accessed 06 07 2014].
  18. Silicon Labs Inc., "The Evolution of Wireless Sensor Networks," [Online]. Available: http://www.silabs.com/Support%20Documents/TechnicalDocs/evolution-of-wireless-sensor- networks.pdf. [Accessed 18 01 2015]. open in new tab
  19. C. Y. Chong and S. P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," Proceedings of the IEEE , vol. 91, no. 8, 2003.
  20. S. Kumar and D. Shepherd, "Sensit: Sensor information technology for the warfighter," Proc. of the 4th International Conference on Information Fusion (FUSION'01), 2001.
  21. Urząd Publikacji Unii Europejskiej, "Advanced Networked embedded platform as a Gateway to Enhance quality of Life," [Online].
  22. J. A. Stankovic, "Wireless Sensor Networks," 2006. open in new tab
  23. H. Deng, W. Li and D. Agrawal, "Routing security in wireless ad hoc networks," IEEE Comm. Magazine, vol. 40, no. 10, 2002.
  24. J. Hill and D. Culler, "A wireless embedded sensor architecture for system-level optimization," UC Berkeley, 2002. open in new tab
  25. E. P. De Freitas, Cooperative Context Aware Setup and Performance of Surveillance Missions Using Static and Mobile Wireless Sensor Networks, 2011.
  26. J. L. Hill, 2003. open in new tab
  27. J. Adams, "Meet the ZigBee Standard," [Online]. open in new tab
  28. O. Younis, M. Krunz and S. Ramasubramanian, "Node Clustering in Wireless Sensor Networks: Recent Developments and Deployment Challenges," Network, IEEE , vol. 20, 2006. open in new tab
  29. W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Hawaii International Conference on System Sciences, 2000. open in new tab
  30. M. J. Handy and M. Hass, "Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection," roc. 4th IEEE International Workshop on Mobile and Wireless Communications Network (MWCN '02), 2002. open in new tab
  31. V. Kumar, S. Jain and S. Tiwari, "Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey," IJCSI International Journal of Computer Science Issues, vol. 8, no. 2, 2011.
  32. W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Commun, vol. 1, no. 4, 2002. open in new tab
  33. M. I. Brownfield, K. Mehrjoo, A. S. Fayez and N. J. Davis IV, "Wireless Sensor Network Energy- Adaptive MAC Protocol," IEEE CCNC, 2006. open in new tab
  34. V. Rajendran, K. Obraczka and J. Garcia-Luna-Aceves, "Energy-efficient MAC: energy-efficient collision-free medium access control for wireless sensor networks," SENSYS, 2003. open in new tab
  35. Y. Wei, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," INFOCOMM, 2002.
  36. T. van Dam and K. Langendoan, "Energy-efficient MAC: An adaptive energy-efficient MAC protocol for wireless sensor networks," ACM SENSYS, 2003. open in new tab
  37. G. Lu, B. Krishnamachari and S. Raghavendra, "An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Sensor Networks," Proc. Parallel and Distributed Processing Symposium, 2004.
  38. O. Incel, A. Ghosh and B. Krishnamachari, "Scheduling Algorithms for Tree-Based Data Collection in Wireless Sensor Networks," Theoretical Aspects of Distributed Computing in Sensor Networks, 2011. open in new tab
  39. A. Keshavarzian, H. Lee and L. Venkatraman, "Wakeup Scheduling in Wireless Sensor Networks," Proceeding of the 7th ACM International Symposium on Mobile ad hoc networking and computing, 2006. open in new tab
  40. J. D. Angelin and X. V. Arul, "Optimizing Delay For Critical Event Monitoring In Wireless Sensor Networks," International Journal of Engineering Research & Technology, vol. 2, 2013.
  41. M. Sichitiu and C. Veerarittiphan, "Simple, Accurate Time Synchronization for Wireless Sensor Networks," IEEE Wireless Communications And Networking, vol. 2, 2003. open in new tab
  42. S. Kumar and S. Chauhan, "A Survey on Scheduling Algorithms for Wireless Sensor Networks," International Journal of Computer Applications, no. 5, 2011. open in new tab
  43. G. Lu, B. Krishnamachari and C. Raghavendra, "An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks," IEEE Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004.
  44. J. Górski et al., "Description of Final ANGEL Demonstrator," "Angel project report", Deliverable 5.2., ANGEL Project, 2007.
  45. J. Górski and A. Turower, "Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks," SCR 2013, 2013. open in new tab
  46. J. Walters, Z. Liang, W. Shi and V. Chaudhary, "Wireless Sensor Network Security: A Survey," in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006.
  47. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networking, vol. 8, no. 5, 2002. open in new tab
  48. A. Pathan, H. Lee and C. Hong, "Security in Wireless Sensor Networks: Issues and Challenges," International Conference on Advanced Communication Technology, 2006. open in new tab
  49. J. Sen, "A Survey on Wireless Sensor Network Security," International Journal of Communication Networks and Information Security, 2009.
  50. M. Prasant and K. Srikanth, "Ad Hoc Networks Technologies and Protocols," Springer, 2004.
  51. S. Sancak, E. Cayirci, V. Coskun and A. Levi, "Sensor wars: detecting and defending against spam attacks in wireless sensor networks," IEEE International Conference on Communications, vol. 1, 2004. open in new tab
  52. S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," ACM/IEEE Internationa Conference on Mobile Computing and Networking, vol. 1, 2000. open in new tab
  53. I. Avramopoulos, H. Kobayashi, R. Wang and A. Krishnamurthy, "Highly secure and efficient routing," IEEE INFOCOM, vol. 1, 2004. open in new tab
  54. S. Sivanantham, K. Kirankumar and V. Akshaya, "Detection and Avoidance of Intrusion, Packet Drop and Modification in WSN," International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 11, 2013.
  55. S. Vijayalakshmi, R. Kurinjimalar and S. Prakash, "Detection of Packet Dropping and Modification in Wireless Sensor Network," International Journal of Computer Science & Engineering Technology, vol. 4, no. 4, 2013.
  56. C. U. Press, "Cambridge Advanced Learner's Dictionary," [Online]. Available: http://dictionary.cambridge.org/. [Accessed 19 03 2011].
  57. N. I. Batt, "Operational Trust: A New Look at the Human Requirement in Network Centric Warfare," 9th International Command and Control Research and Technology, 2004.
  58. H. Baldus et al., "WSN Trust Management Model," "Angel project report: WSN trust architecture and security protocols", Deliverable 3.2., ANGEL Project, 2007.
  59. J. Górski, A. Turower and A. Wardziński, "Distributed Trust Management Model for Wireless Sensor Networks," DepCoS, 2011. open in new tab
  60. Y. Sun, Z. Han and K. Liu, "Defense of Trust Management Vulnerabilities in Distributed Networks," Communications Magazine, no. 46, 2008. open in new tab
  61. R. Abassi and S. G. El Fatmi, "Securing a Trust-based MANET against Collusion Attacks," SAFECOMP, vol. 1, 2014.
  62. M. Theoharidou, P. Kotzanikolaou and D. Gritzalis, "A multi-layer criticality assesment methodology based on interdependencies," Computers & Security, vol. 6, no. 29, 2010. open in new tab
  63. C. Lambrinoudakis, S. Gritzalis, F. Dridi and G. Pernul, "Security requirements for e-goverment services: A metholodical approach for developing a common based PKI-security policy," Computer Communications, no. 26, pp. 1873-1883, 2003. open in new tab
  64. ISO and IEC, ISO/IEC 27002:2005 -Information technology -security techniques -Code of practise for information security management, 2005. open in new tab
  65. B. Księżopolski, Z. Kotulski and P. Szałachowski, "Adaptive approach to network security," in Computer Networks, Springer, 2009, pp. 233-241. open in new tab
  66. B. Księżopolski and Z. Kotulski, "Adaptable security mechanism for dynamic environments," Computers & Security, pp. 246-255, 2007. open in new tab
  67. S. Lindskog, Modelling and Tunning Security form Quality of Service Perspective -PhD Thesis, Chalmers University of Technology, 2005. open in new tab
  68. Texas Instruments, "CC2520 Development Kit User's Guide," [Online]. Available: http://www.ti.com/lit/ug/swru138/swru138.pdf. [Accessed 03 07 2014]. open in new tab
  69. M. Kurowski, "Zarządzanie zaufaniem jako metoda zabezpieczenia rozproszonych bezprzewodowych sieci sensorów przed atakami," 2013.
  70. Texas Instruments, "Code Composer Studio IDE," [Online]. open in new tab
  71. IAR Systems, "IAR Workbench IDE dla Texas Instruments MSP430," [Online]. Available: http://www.iar.com/en/Products/IAR-Embedded-Workbench/TI-MSP430/. [Accessed 04 10 2013]. open in new tab
  72. Texas Instruments, "HAL Library and example applications for MSP430," [Online]. Available: http://www.ti.com/litv/zip/swrc090b. [Accessed 09 03 2014]. open in new tab
  73. OMNeT++ Commnunity, "OMNeT++ Simulation Framework," [Online]. Available: http://omnetpp.org/. [Accessed 29 06 2014].
  74. NesCT Community, "NesCT," [Online]. Available: http://nesct.sourceforge.net/. [Accessed 29 06 2014].
  75. [78] PAWiS Community, "PAWiS Simulation Framework," [Online]. open in new tab
  76. Australia's Information Communications Technology Research Centre of Excellence, "Castalia Wireless Sensor Network Simulator," [Online]. open in new tab
  77. IAR Systems, "IAR Embedded Workbench," [Online]. Available: http://www.iar.com/. [Accessed 29 06 2014].
  78. WSNSim Community, "WSNSim," [Online]. Available: http://sourceforge.net/projects/wsnsim/. [Accessed 29 06 2014].
  79. NS-2 Community, "NS-2," [Online]. Available: http://nsnam.isi.edu/nsnam. [Accessed 29 06 2014]. open in new tab
  80. NS-3 Community, "NS-3," [Online]. Available: http://www.nsnam.org/. [Accessed 29 06 2014]. open in new tab
  81. TOSSIM Community, "TOSSIM," [Online]. Available: http://tinyos.stanford.edu/tinyos- wiki/index.php/TOSSIM. [Accessed 29 06 2014].
  82. F. Yu, "A Survey of Wireless Sensor Network Simulation Tools," [Online]. Available: http://www.cse.wustl.edu/~jain/cse567-11/ftp/sensor/index.html. [Accessed 29 06 2014].
  83. J-Sim Community, "J-Sim," [Online]. Available: https://sites.google.com/site/jsimofficial/. [Accessed 29 06 2014]. open in new tab
  84. UCLA Compilers Group, "avrora," [Online]. Available: http://compilers.cs.ucla.edu/avrora/. [Accessed 29 06 2014].
  85. Tetcos, "NetSim -network simulator," [Online]. Available: http://tetcos.com/netsim_gen.html. [Accessed 29 06 2014].
  86. Wikimedia Foundation, "NetSim," [Online]. Available: http://en.wikipedia.org/wiki/NetSim. [Accessed 29 06 2014]. open in new tab
  87. D. Quaglia ed., "Complete co-simulation framework and refined models of the components of the Angel platform," "Angel project report", Deliverable 2.3., ANGEL Project, 2008.
  88. R. van Solingen and E. Berghout, The Goal/Question/Metric method: A practical guide for quality improvement of software development, McGraw-Hill Publishing Company, 1999. open in new tab
  89. E. Bulut, Z. Wang and B. K. Szymanski, "The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks," Communications (ICC), 2010 IEEE International Conference on, pp. 1 -5, 2010. open in new tab
  90. F. Delicato, F. Protti, J. F. De Rezende, L. Rust and L. Pirmez, "Application-driven node management in multihop wireless sensor networks," Lecture Notes in Computer Science, pp. 569-576, 2005. open in new tab
  91. A. Jhumka and L. Mottola, "On Consistent Neighborhood Views in Wireless Sensor Networks," Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE International Symposium on, pp. 199 - 208, 2009. open in new tab
  92. H. Seltman, Experimental Design for Behavioral and Social Sciences, 2014.
  93. M. L. Mitchell and J. M. Jolley, Research design explained, Wadsworth, 2013.
  94. R. Perlman, "An overview of PKI trust models," IEEE Network, vol. 13, no. 6, 1999. open in new tab
  95. H. Chen, H. Wu, X. Zhou and C. Gao, "Agent-based Trust Model in Wireless Sensor Networks," 8th ACIS Int.Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. open in new tab
  96. H. Chen, H. Wu, X. Zhou and C. Gao, "Reputation-based Trust in Wireless Sensor Networks," International Conference on Multimedia and Ubiquitous Engineering MUE'07, 2007. open in new tab
  97. A. Boukerche and X. Li, "An Agent-based Trust and Reputation Management Scheme for Wireless Sensor Networks," IEEE Globecom 2005, 28 Nov -2 Dec 2005. open in new tab
  98. T. Zahariadis, H. C. Leligou, P. Trakadas and S. Voliotis, "Trust management in wireless sensor networks," InterScience, 2010.
  99. Y. Yu, K. Li, W. Zhou and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, 2012. open in new tab
  100. J. Lopez, R. Roman, I. Agudo and C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, vol. 33, 2010. open in new tab
  101. F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera and L. Romano, "Trust- Based Intrusion Tolerant Routing in Wireless Sensor Networks," SAFECOMP, vol. 1, 2014. open in new tab
  102. M. Maroti, "The Flooding Time Synchronization Protocol," proc. of 2nd ACM Conference on Embedded Networked Sensor Systems, 2004. open in new tab
  103. V. Loscri, "A Two-Levels Hierarchy for Low-Energy Adaptive Clustering Hierarchy (TL-LEACH)," Vehicular Technology Conference, 2005. open in new tab
  104. T. Zia, "Reputaton-based Trust Managmenet in Wireless Sensor Networks," Intelligent Sensors, Sensor Networks and Information Processing, 2008. open in new tab
  105. F. Song and B. Zhao, "Trust-based LEACH Protocol for Wireless Sensor Networks," Future Generation Communication and Networking FGCN '08, 13-15 Dec 2008. open in new tab
  106. M. Momani and S. Challa, "Trust Management in Wireless Sensor Networks," Proc. of 5th ACM Conf. on Embedded Networked Sensor Systems,, November 6 -9, 2007. open in new tab
  107. A. Josang and R. Ismail, "The BetaReputation System," 15th Bled Electronic Commerce Conference, 2002.
  108. R. Feng, X. Xu, X. Zhou and J. Wan, "A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory," Sensors, vol. 11, no. 2, 2011. open in new tab
  109. F. Bao, I.-R. Chen, J.-H. Cho and J.-H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, pp. 169-183, 6 2012. open in new tab
  110. "Evolution of wireless sensor networks towards the Internet of Things: A survey," in Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th International Conference on, Split, IEEE, 2011, pp. 1-6. open in new tab
  111. J. Górski and A. Turower, "Using trust management model for detection of faulty nodes in Wireless Sensor Networks," in ICT Young vol. 1, Gdańsk, Politechnika Gdańska, 2011, pp. 471- 476. open in new tab
  112. J. Górski and A. Turower, "Two-tier distributed trust management model for wireless sensor networks," II Ogólnopolskie Seminarium: Forum Innowacji Młodych Badaczy, 2011. open in new tab
  113. J. Górski and A. Turower, "Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku," in Studia Informatica vol. 33, Gliwice, Wydawnictwo Politechniki Śląskiej, 2012, pp. 125-137.
  114. J. Górski and A. Turower, "Trust management in WSN -case study evaluation," in ICT Young vol. 2, Gdańsk, Politechnika Gdańska, 2015, pp. 581-588.
  115. A. Mishra, "On Scheduling Guaranteed Time Slots for Time Sensitive Transactions in IEEE 802.15.4 Networks," Military Communications Conference, 2007. open in new tab
  116. H. Labiod, H. Afifi and C. De Santis, Wi-Fi™, Bluetooth™, Zigbee™ and WiMax™, Springer, 2007. open in new tab
  117. K. Chan, L. K. Yeung and W. Shao, "Contention-based MAC protocols with erasure coding for wireless data networks," Ad Hoc Networks, vol. 3, no. 4, 2005. open in new tab
  118. W. Ye, J. Heidemann and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2002.
  119. Import source code to the chosen Integrated Development Environment (IDE) or modify files in any text editor. The source code is delivered with NetBeans IDE project. open in new tab
  120. Modify settings (final static parameters defined in the beginning of a file) in: a. Main.java file: general setting like simulated network sizes and number of simulations; open in new tab
  121. b. Simulation.java file: specific simulation settings. Every setting is commented to facilitate modifications. open in new tab
  122. In any place of Simulation.java file a call to the following methods can be added: a. printSituation() displays on standard output current values of trust tables for each network node; open in new tab
  123. b. System.out.print(node) displays on standard output current value of the trust table for the given node; open in new tab
  124. c. new Graph(nodes) displays new Swing window showing how nodes are scattered on a simulation are and how are currently connected. open in new tab
  125. Run simulator. In NetBeans IDE it can be done by clicking F6 button. Results will be displayed on standard output. open in new tab
Verified by:
Gdańsk University of Technology

seen 182 times

Recommended for you

Meta Tags