Credibility Propagation for Robust Data Aggregation in WSNs

Trust and reputation systems are widely employed in WSNs in order to help decision making processes by assessing trustworthiness of sensor nodes in a data aggregation process. However, in unattended and hostile environments, some sophisticated malicious attacks such as collusion attacks can distort the computed trust scores and lead to low quality or deceptive services as well as to undermine the aggregation results. Thus, taking into account the collusion attacks for developing a secure trust-based data aggregation in unattended environments has become an important research issue. In this paper, we address this problem by proposing a novel collaborativebased trust framework for WSNs, which is based on the introduced concept of credibility propagation. In this method, the trustworthiness of a sensor node is evaluated from the amount of credibility that such a node collects from other nodes. Moreover, we obtain the statistical parameters of sensors errors including sensors’ variances from such credibility values. Accordingly, we propose an iterative filtering algorithm to recursively compute the credibility and variance of all sensors. Following this algorithm, an estimate of the true value of the signal can be effectively obtained through the maximum likelihood estimation. Furthermore, we augment the proposed trust framework with a collusion detection and revocation method as well as data streaming algorithm. Extensive experiments across a wide variety of configurations over both real-world and synthetic datasets demonstrate the efficiency and effectiveness of our approach.

[1]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[2]  Michèle Sebag,et al.  Data Stream Clustering With Affinity Propagation , 2014, IEEE Transactions on Knowledge and Data Engineering.

[3]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[4]  Luca de Alfaro,et al.  CrowdGrader: Crowdsourcing the Evaluation of Homework Assignments , 2013, ArXiv.

[5]  Yang Xiao,et al.  Outlier detection based fault tolerant data aggregation for wireless sensor networks , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[6]  Giulio Giunta,et al.  A mathematical model of collaborative reputation systems , 2012, Int. J. Comput. Math..

[7]  Sajal K. Das,et al.  A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.

[8]  Giulio Cimini,et al.  Measuring quality, reputation and trust in online communities , 2012, ISMIS.

[9]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[10]  Elisa Bertino,et al.  A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[11]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[12]  Hong Cheng,et al.  Robust Reputation-Based Ranking on Bipartite Rating Networks , 2012, SDM.

[13]  Belle L. Tseng,et al.  User reputation in a comment rating environment , 2011, KDD.

[14]  Sangkyum Kim,et al.  Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.

[15]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[16]  Hasan Çam,et al.  Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.

[17]  François Fouss,et al.  A probabilistic reputation model based on transaction ratings , 2010, Inf. Sci..

[18]  Alex Talevski,et al.  Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[19]  Matús Medo,et al.  The effect of discrete vs. continuous-valued ratings on reputation and ranking systems , 2010, ArXiv.

[20]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[21]  Paul Van Dooren,et al.  Iterative Filtering in Reputation Systems , 2010, SIAM J. Matrix Anal. Appl..

[22]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[23]  Erman Ayday,et al.  An iterative algorithm for trust and reputation management , 2009, 2009 IEEE International Symposium on Information Theory.

[24]  Deepak Ganesan,et al.  PRESTO: feedback-driven data management in sensor networks , 2009, TNET.

[25]  A. Jøsang,et al.  Challenges for Robust Trust and Reputation Systems , 2009 .

[26]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[27]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[28]  François Ingelrest,et al.  SensorScope: Out-of-the-Box Environmental Monitoring , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[29]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[30]  S. Muthukrishnan,et al.  Sequential Change Detection on Data Streams , 2007, Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007).

[31]  Hsinchun Chen,et al.  A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce , 2007, IEEE Intelligent Systems.

[32]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[33]  Robert Lund,et al.  A Review and Comparison of Changepoint Detection Techniques for Climate Data , 2007 .

[34]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[35]  Yi-Cheng Zhang,et al.  Information filtering via Iterative Refinement , 2006, ArXiv.

[36]  Yi-Kuo Yu,et al.  Decoding Information from noisy, redundant, and intentionally-distorted sources , 2006, cond-mat/0603620.

[37]  Aoying Zhou,et al.  Density-Based Clustering over an Evolving Data Stream with Noise , 2006, SDM.

[38]  Stuart Barber,et al.  All of Statistics: a Concise Course in Statistical Inference , 2005 .

[39]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[40]  Reza Curtmola,et al.  Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .

[41]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.