ProTru: a provenance‐based trust architecture for wireless sensor networks

Summary Trust is an important component of wireless sensor networks for believability of the produced data, and trust history is a crucial asset in deciding trust of the data. In this paper, we show how provenance can be used for registering previous trust records and other information such as node type, data type, and node location. Our aim is to design a distributed trust-enhancing architecture using only local provenance during sensor fusion with a low communication overhead. Our network is cognitive in the sense that our system reacts automatically upon detecting low trust. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[2]  Amit P. Sheth,et al.  Linked sensor data , 2010, 2010 International Symposium on Collaborative Technologies and Systems.

[3]  Yang-Sae Moon,et al.  Assessing the Trustworthiness of Streaming Data , 2010 .

[4]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[5]  Eli Herscovitz,et al.  Secure virtual private networks: the future of data communications , 1999, Int. J. Netw. Manag..

[6]  Elisa Bertino,et al.  Research issues in data provenance for streaming environments , 2009, SPRINGL '09.

[7]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[8]  John S. Heidemann,et al.  Provenance in Sensornet Republishing , 2008, IPAW.

[9]  Daniel Crawl,et al.  Workflows and extensions to the Kepler scientific workflow system to support environmental sensor data access and analysis , 2010, Ecol. Informatics.

[10]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[11]  S. Challa,et al.  RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[12]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[13]  Elisa Bertino,et al.  Trust Evaluation of Data Provenance , 2008 .

[14]  M. Welsh,et al.  Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[15]  Jochen Mundinger,et al.  Reputation in self-organized communication systems and beyond , 2006 .

[16]  Yu-Kwong Kwok,et al.  A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[17]  Saad Haj Bakry Development of security policies for private networks , 2003 .

[18]  Edward A. Lee,et al.  Real-Time Distributed Discrete-Event Execution with Fault Tolerance , 2008, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium.

[19]  Saad Haj Bakry,et al.  Development of security policies for private networks , 2003, Int. J. Netw. Manag..

[20]  Chaki Ng,et al.  Provenance-Aware Sensor Data Storage , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[21]  R. Govindan,et al.  A PROGRAMMABLE WIRELESS SENSING SYSTEM FOR STRUCTURAL MONITORING , 2022 .

[22]  Amit P. Sheth,et al.  Provenance Aware Linked Sensor Data , 2010 .

[23]  Wang-Chien Lee,et al.  Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access , 2007 .

[24]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[25]  Eric G. Stephan,et al.  Leveraging the Open Provenance Model as a Multi-tier Model for Global Climate Research , 2010, IPAW.

[26]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[27]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[28]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[29]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[30]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.

[31]  Jie Wu,et al.  A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[32]  Saurabh Bagchi,et al.  TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[33]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[34]  Margo I. Seltzer,et al.  Provenance: a future history , 2009, OOPSLA Companion.

[35]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.

[36]  Omer F. Rana,et al.  Evaluating Provenance-based Trust for Scientific Workflows , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).

[37]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[38]  Steven D. Glaser,et al.  Some real-world applications of wireless sensor nodes , 2004, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.

[39]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[40]  Norman L. Chervany,et al.  Conceptualizing trust: a typology and e-commerce customer relationships model , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[41]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[42]  B SrivastavaMani,et al.  Reputation-based framework for high integrity sensor networks , 2008 .

[43]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[44]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[45]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[46]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[47]  Junguo Zhang,et al.  Forest fire detection system based on a ZigBee wireless sensor network , 2008 .

[48]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[49]  Liudong Xing,et al.  Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[50]  Ping Ji,et al.  Tiered architecture for on-line detection, isolation and repair of faults in wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[51]  Tarek F. Abdelzaher,et al.  SNTS: Sensor Network Troubleshooting Suite , 2007, DCOSS.

[52]  Daniel Crawl,et al.  A Provenance-Based Fault Tolerance Mechanism for Scientific Workflows , 2008, IPAW.

[53]  Rodrigo Roman,et al.  A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[54]  Kiyoung Kim,et al.  A security framework with trust management for sensor networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[55]  Johnson I. Agbinya,et al.  A New Algorithm of Trust Formation in Wireless Sensor Networks , 2007 .

[56]  Matt Welsh,et al.  Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[57]  Jiawei Han,et al.  Finding Symbolic Bug Patterns in Sensor Networks , 2009, DCOSS.

[58]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .