Trustworthy Wireless Networks : Issues and Applications

Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misopera tion and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one or more components are compromised. These approaches are not sufficient for holistic and systemic security. In this paper we analyse a more systematic security approach by exploiting the fundamenta l relationships among the network components. We explore a concept called trust worthy network where nodes establishe s relationships among themselves based on the mutual observa tions and interactions. These relationships will help to derive t he level of security and trust to be possessed on the nodes and the message received from the nodes. We analyse in detail the var ious issues in constructing the trustworthy networks, impact ofvarious network dynamics on the trust relationships and the applications of trust worthiness in assessing the information quality, t o evict the misbehaving nodes and to provide other related security services.

[1]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[2]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[3]  Prasant Mohapatra,et al.  Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[4]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[5]  Marcin Detyniecki,et al.  Mathematical Aggregation Operators and their Application to Video Querying , 2000 .

[6]  P. Lamsal Understanding Trust and Security , 2001 .

[7]  Mariëlle den Hengst,et al.  Proceedings of the 34th annual Hawaii International Conference on System Sciences , 2001 .

[8]  Jennifer Golbeck Computing withTrust: Definition, Properties, and Algorithms (Invited Paper) , 2006 .

[9]  G.M. Coates,et al.  A Trust System Architecture for SCADA Network Security , 2010, IEEE Transactions on Power Delivery.

[10]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[11]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[12]  Yanjun Zuo,et al.  Information trustworthiness evaluation based on trust combination , 2006, SAC '06.

[13]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.