Functional reputation based reliable data aggregation and transmission for wireless sensor networks

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.07.017 * Tel.: +90 312 231 7400x2123; fax: +90 312 230 8 E-mail addresses: suatozdemir@gazi.edu.tr, suatoz In wireless sensor networks, compromised sensor nodes aim to distort the integrity of data by sending false data reports, injecting false data during data aggregation, and disrupting transmission of aggregated data. Previously known trust systems rely on general reputation concept to prevent these attacks. However, this paper presents a novel reliable data aggregation and transmission protocol, called RDAT, which is based on the concept of functional reputation. Protocol RDAT improves the reliability of data aggregation and transmission by evaluating each type of sensor node action using a respective functional reputation. In addition, protocol RDAT employs a fault tolerant Reed–Solomon coding scheme based multi path data transmission algorithm to ensure the reliable data transmission to the base station. The simulation results show that protocol RDAT significantly improves the reliability of the data aggregation and transmission in the presence of compromised nodes. 2008 Elsevier B.V. All rights reserved.

[1]  Pramod K. Varshney,et al.  Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.

[2]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[4]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[5]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[7]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[8]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[9]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[10]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[11]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .

[12]  E. A. Etchu Security and Privacy in Sensor Networks , 2010 .

[13]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[14]  G. Casella,et al.  Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.

[15]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[16]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[17]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[18]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[19]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[20]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[21]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[22]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[23]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[25]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[26]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[27]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[28]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.

[29]  Hasan Cam,et al.  False Data Detection and Secure Data Aggregation in Wireless Sensor Networks , 2007 .

[30]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[31]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[32]  Deborah Estrin,et al.  Scalable Coordination in Sensor Networks , 1999, MobiCom 1999.

[33]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[34]  Hasan Çam,et al.  Key establishment with source coding and reconciliation for wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[35]  Hasan Çam,et al.  Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..

[36]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[37]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[38]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[39]  Deborah Estrin,et al.  Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[40]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[41]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[42]  Óscar García-Morchón,et al.  Distributed Node Revocation based on Cooperative Security , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[43]  Zygmunt J. Haas,et al.  Analysis of multipath Routing-Part I: the effect on the packet delivery ratio , 2004, IEEE Transactions on Wireless Communications.