Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
Top Cited Papers
- 23 March 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Network and Service Management
- Vol. 9 (2), 169-183
- https://doi.org/10.1109/tcomm.2012.031912.110179
Abstract
We propose a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. Unlike prior work, we consider multidimensional trust attributes derived from communication and social networks to evaluate the overall trust of a sensor node. By means of a novel probability model, we describe a heterogeneous WSN comprising a large number of sensor nodes with vastly different social and quality of service (QoS) behaviors with the objective to yield "ground truth" node status. This serves as a basis for validating our protocol design by comparing subjective trust generated as a result of protocol execution at runtime against objective trust obtained from actual node status. To demonstrate the utility of our hierarchical trust management protocol, we apply it to trust-based geographic routing and trust-based intrusion detection. For each application, we identify the best trust composition and formation to maximize application performance. Our results indicate that trust-based geographic routing approaches the ideal performance level achievable by flooding-based routing in message delivery ratio and message delay without incurring substantial message overhead. For trust-based intrusion detection, we discover that there exists an optimal trust threshold for minimizing false positives and false negatives. Furthermore, trust-based intrusion detection outperforms traditional anomaly-based intrusion detection approaches in both the detection probability and the false positive probability.Keywords
This publication has 29 references indexed in Scilit:
- A trust management architecture for hierarchical wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Group-Based Trust Management Scheme for Clustered Wireless Sensor NetworksIEEE Transactions on Parallel and Distributed Systems, 2008
- Anomaly detection in wireless sensor networksIEEE Wireless Communications, 2008
- Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy CaseIEEE/ACM Transactions on Networking, 2008
- PLUS: Parameterized and Localized trUst management Scheme for sensor networks securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Estimation of the number of operating sensors in large-scale sensor networks with mobile accessIEEE Transactions on Signal Processing, 2006
- Autonomic trust prediction for pervasive systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Engineering human trust in mobile system collaborationsPublished by Association for Computing Machinery (ACM) ,2004
- The distinctive design characteristic of a wireless sensor network: the energy mapComputer Communications, 2004
- Residual energy scan for monitoring sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003