An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks

Wireless sensor networks are hard to be stable and vulnerable to various attacks, so it's a need to find the mechanisms to evaluate trustworthiness with trusted computing theories. In this paper, a novel entropy-based trust modeling and evaluation methods for WSNs are carried out to give the stability and security descriptions. With the experiments, it is proved that they can be used to detect the malicious nodes, to estimate the effect and the performance of WSN.

[1]  Fillia Makedon,et al.  Analysis of a low-dimensional linear model under recommendation attacks , 2006, SIGIR.

[2]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[4]  Hung T. Nguyen,et al.  Probability Updating Using Second Order Probabilities and Conditional Event Algebra , 1999, Inf. Sci..

[5]  Yang Bo,et al.  Using Trust Metric to Detect Malicious Behaviors in WSNs , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[6]  Carles Sierra,et al.  An information-based model for trust , 2005, AAMAS '05.

[7]  Paolo Donzelli,et al.  A unified model of dependability: capturing dependability in context , 2004, IEEE Software.

[8]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[9]  Shichao Zhang,et al.  Detecting Collusion Attacks in Security Protocols , 2006, APWeb.

[10]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[11]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.

[12]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[13]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[14]  Daniel W. Manchala,et al.  Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[15]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[16]  W. Liu,et al.  Trustworthy service selection and composition - reducing the entropy of service-oriented Web , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[17]  Michael K. Reiter,et al.  Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.