Agent-Based Trust Management Model for Wireless Sensor Networks

In wireless sensor networks (WSNs), these sensor nodes cooperate with each other to form a network without using any infrastructure. WSNs has a wide application. But the security of WSNs is still an issue. Traditionally cryptographic mechanisms such as authentication and encryption only address part of the problem of security in WSNs. Recently, the use of reputation and trust systems has become an important mechanism in WSNs. In this paper, we develop a distributed agent-based trust management scheme. The agent node use watchdog mechanism to observe the behavior of the sensor nodes and computes the trust rating for them. We consider packet-dropping and hello flood attack in our simulation, the simulation results and analysis show that our scheme can fast detect the malicious nodes and scale well for wireless sensor networks.

[1]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[2]  Haiguang Chen,et al.  A new kind of session keys based on message scheme for sensor networks , 2005, 2005 Asia-Pacific Microwave Conference Proceedings.

[3]  Huafeng Wu,et al.  Trust Propagation and Aggregation in Wireless Sensor Networks , 2007, 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2007).

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[8]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[9]  Hyunsoo Yoon,et al.  Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network , 2005 .

[10]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[11]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[12]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[13]  Haiguang Chen,et al.  Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks , 2007, PAISI.