Research on secure data collection in wireless multimedia sensor networks

Anti-attack during data collection is a crucial challenge in wireless multimedia sensor networks (WMSNs). Because WMSNs are usually deployed at unattended or hostile environments, an adversary can easily compromises several sensor nodes and controls them to launch attacks. These compromised nodes are difficult to be detected by traditional secure scheme due to having all keying materials. This paper proposes a novel trust evaluation model to detect the compromised nodes in WMSNs. Under our design, each node computes the trust value of their behaviors and builds a local trust management. Moreover, an energy-efficient secure routing is proposed to achieve secure data collection and meet the requirement of energy efficiency. The effectiveness of the proposed schemes is evaluated by analysis and extensive simulations.

[1]  Fang Liu,et al.  WSN09-2: On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks , 2006, IEEE Globecom 2006.

[2]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[3]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[4]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[5]  NingPeng,et al.  How to misuse AODV , 2005 .

[6]  Sisi Liu,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2009, IEEE INFOCOM 2009.

[7]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[8]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[10]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[11]  Victor C. M. Leung,et al.  Directional geographical routing for real-time video communications in wireless sensor networks , 2007, Comput. Commun..

[12]  R. F.,et al.  Mathematical Statistics , 1944, Nature.

[13]  Victor C. M. Leung,et al.  Applications and design issues for mobile agents in wireless sensor networks , 2007, IEEE Wireless Communications.

[14]  P. Lachenbruch Mathematical Statistics, 2nd Edition , 1972 .

[15]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Yu Hen Hu,et al.  Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..

[17]  Bing He,et al.  An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[18]  Min Chen,et al.  Mobile multimedia sensor networks: architecture and routing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[19]  Nitin H. Vaidya,et al.  Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[20]  Xiuzhen Cheng,et al.  Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[22]  Ran Wolff,et al.  In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.

[23]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[24]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.