Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks

Secure data aggregation exerts more and more important effects on the research of wireless sensor network. There occurs many groping research subject, via managing nodes’ trust and reputation to keep data aggregation secure. The nodes in wireless sensor networks are often compromised and those compromised nodes will do a lot of harmful behaviors to decrease the security of wireless sensor networks. These behaviors include impersonate legal nodes to join routing paths, selectively forward data to an adversary, inject erroneous data, and disrupt data transmission. Thus, the conception of nodes’ trust is introduced into data aggregation to judge and evaluate whether the nodes are trustable or not. In this paper, we propose an improved trust management method for data aggregation based on the relationship between nodes that is called the strength of the ties between the nodes. The improved method is developed from the trust model in the iRTEDA protocol and increasing the utilization efficiency of second-hand information coming from neighboring nodes. The aim of the proposed trust model is to obtain a higher level of security for data aggregation. The simulation results show us that data aggregation, based on proposed trust management method, can get higher accuracy of evaluating nodes’ trust and reputation and achieve higher data accuracy of aggregating.

[1]  Yun Liu,et al.  Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[2]  Pramod K. Varshney,et al.  Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.

[3]  Chin-Feng Lai,et al.  A green data transmission mechanism for wireless multimedia sensor networks using information fusion , 2014, IEEE Wireless Communications.

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[5]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[6]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[7]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[9]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .

[10]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[11]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[12]  Junfu Yu,et al.  Fault Detection for Large-Scale Railway Maintenance Equipment Base on Wireless Sensor Networks , 2014 .

[13]  Keqiu Li,et al.  Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks , 2011, Comput. Commun..

[14]  S. Ozdemir,et al.  Functional Reputation Based Data Aggregation for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[15]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.

[16]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[18]  Murat Demirbas,et al.  The impact of data aggregation on the performance of wireless sensor networks , 2008 .

[19]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[20]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.