Trust-based security for wireless ad hoc and sensor networks

被引:167
作者
Boukerch, A. [1 ]
Xu, L.
El-Khatib, K.
机构
[1] Univ Ottawa, Paradise Res Lab Site, Ottawa, ON K1N 6N5, Canada
[2] Univ Ontario, Inst Technol, N Oshawa, ON L1H 7K4, Canada
基金
加拿大自然科学与工程研究理事会; 加拿大创新基金会;
关键词
wireless sensor networks; mobile agent; trust; reputation; overhead; delay;
D O I
10.1016/j.comcom.2007.04.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensors networks are susceptible to a large number of security threats, and because of the communication, computation and delay constraints of most applications that run on top of these networks, traditional security mechanisms cannot be used. Trust and reputation have been recently suggested as an effective security mechanism for open environments such as the Internet, and considerable research has been done on modeling and managing trust and reputation. Using the trust and reputation management scheme to secure wireless sensor networks (WSNs) requires paying close attention to the incurred bandwidth and delay overhead, which have thus far been overlooked by most research work. In this paper, we propose a novel agent-based trust and reputation management scheme (ATRM) for wireless sensor networks. The objective of the scheme is to manage trust and reputation locally with minimal overhead in terms of extra messages and time delay. Throughout the entirety of this paper, we describe our scheme and prove its correctness. We will also present our extensive performance evaluation results, which clearly show that trust and reputation can be computed in wireless sensor networks with minimal overhead. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:2413 / 2427
页数:15
相关论文
共 45 条
[1]  
Abdul-Rahman Alfarez., 2000, System Sciences, P9, DOI DOI 10.1109/HICCS.2000.926814
[2]  
ALUNKAL B, 2006, P WORKSH AD GRID MID
[3]  
[Anonymous], 1990, Can we trust? Trust: Making and Breaking Cooperative Relations
[4]  
[Anonymous], 1999, KEYNOTE TRUST MANAGE
[5]  
[Anonymous], TRUST MODERN SOC SEA
[6]  
[Anonymous], 2004, P 27 AUSTRALASIAN C
[7]  
[Anonymous], 2004, WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security, DOI DOI 10.1145/1023646.1023648
[8]  
[Anonymous], 1998, LNCS
[9]  
[Anonymous], 3280 RFC
[10]  
Azzedin F, 2002, CCGRID 2002: 2ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, PROCEEDINGS, P452, DOI 10.1109/CCGRID.2002.1017189