Assuring trustworthiness of sensor data for cyber-physical systems

The term cyber-physical system (CPS) refers to the tight conjoining of and coordination between computational and physical resources. A typical Wireless Sensor Network (WSN) that consists of hundreds off-the-shelf cheap sensor nodes is a common application of a CPS. Each sensor node is equipped with a power-efficient micro-controller, a wireless transmitter, and sensory for environmental monitoring. WSNs are used for monitoring critical infrastructures or habitat monitoring as well as used in military scenarios for urgent decision making. A precondition for such a decision support is to assure the trustworthiness of the reported sensor data. Simply securing the hardware is difficult due to existing resource limitations; in particular power consumption and lack of tamper resistance. A WSN, however, consists of several hundreds of sensor nodes. The idea is to use this redundancy, which is an inherent feature of WSN, to assure trustworthiness. Until now, device redundancy has been used for assuring fault tolerance only but not for security purposes. In this paper, we propose to use device redundancy in WSN to detect and isolate malicious nodes, and with this efficiently protect off-the-shelf WSN as well as assure trustworthiness of sensor data.

[1]  Uwe Aickelin,et al.  Anomaly Detection Using the Dempster-Shafer Method , 2006, DMIN.

[2]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[3]  Alex Talevski,et al.  Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[4]  Christoph Krauß Handling insider attacks in wireless sensor networks , 2008, Inf. Secur. Tech. Rep..

[5]  Björn Stelte An event management communication system for Wireless Sensor Networks , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[6]  Jeffrey A. Barnett,et al.  Computational Methods for a Mathematical Theory of Evidence , 1981, IJCAI.

[7]  Andreas Matheus,et al.  Evidence theory for reputation-based trust in wireless sensor networks , 2012, COM.Geo '12.

[8]  Andreas Matheus,et al.  Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation , 2011, 2011 IEEE SENSORS Proceedings.

[9]  Mooseop Kim,et al.  Design of Cryptographic Hardware Architecture for Mobile Computing , 2009, J. Inf. Process. Syst..

[10]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[11]  立花 篤男,et al.  13^ IFIP/IEEE International Symposium on Integrated Network Management (IM2013)報告(特別講演,管理機能,理論・運用方法論,及び一般) , 2013 .

[12]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[13]  P. Sridhar,et al.  Multi-Criteria Decision Making in Sensor Networks , 2008, IEEE Instrumentation & Measurement Magazine.

[14]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[15]  Björn Stelte,et al.  State-of-the-Art Kryptoverfahren für drahtlose Sensornetze - Eine Krypto-Bibliothek für MantisOS , 2010, Sicherheit.

[16]  Reza Curtmola,et al.  Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .

[17]  Subhash Challa,et al.  GTRSSN: Gaussian Trust and Reputation System for Sensor Networks , 2008, SCSS.

[18]  Claudia Eckert,et al.  On handling insider attacks in wireless sensor networks , 2008 .