Toward Reliable Actor Services in Wireless Sensor and Actor Networks

Wireless sensor and actor networks (WSANs) are service-oriented environments, where sensors request actors to service their detected events and actors move to deliver the desired services. Because of their openness and unattended nature, these networks are vulnerable to various security attacks. In this paper we address service fraud attacks for the first time, whose objective is to stop the normal use of actor services by fake service requests and/or delivery. To mitigate this type of security attacks, we propose a novel cooperative authentication scheme. With the scheme, a sensor's service request is cooperatively authenticated by the sensors that witness the same event, and an actor's service delivery effort is cooperatively authenticated by the sensors that witness the actor's behavior. Considering the presence of compromised sensor/actor nodes, the trustworthiness of each authenticated service delivery process is subject to location consistency check and witness diversity check. It may then be taken into account to adjust the corresponding actor's trust rating so as to influence future actor service selection. We analyze the communication overhead and the security strength of the scheme. We show that our scheme ensures fraud-resistant actor services in our considered WSAN environment.

[1]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[2]  Ivan Stojmenovic,et al.  Strictly Localized Sensor Self-Deployment for Optimal Focused Coverage , 2011, IEEE Transactions on Mobile Computing.

[3]  Haiyun Luo,et al.  Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.

[4]  Ivan Stojmenovic,et al.  Communication Aspects of Coordination in Robot Wireless Networks , 2010 .

[5]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[6]  Panagiotis Papadimitratos,et al.  Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.

[7]  Hai Liu,et al.  Chapter 9 Coordination in Sensor , Actuator and Robot Networks , 2010 .

[8]  Ivan Stojmenovic,et al.  Sink Mobility in Wireless Sensor Networks , 2010 .

[9]  Konstantinos Psounis,et al.  Modeling spatially correlated data in sensor networks , 2006, TOSN.

[10]  Jiming Chen,et al.  Leveraging Prediction to Improve the Coverage of Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[11]  Marinho P. Barcellos,et al.  Flexible and secure service discovery in ubiquitous computing , 2010, J. Netw. Comput. Appl..

[12]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[13]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[14]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[15]  Ivan Stojmenovic,et al.  Robot to Robot , 2010, IEEE Robotics & Automation Magazine.

[16]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[17]  Sheikh Iqbal Ahamed,et al.  A trust-based secure service discovery (TSSD) model for pervasive computing , 2008, Comput. Commun..

[18]  Younghee Lee,et al.  Autonomic Trust Extraction for Trustworthy Service Discovery in Urban Computing , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[19]  Ivan Stojmenovic,et al.  Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks , 2009, IEEE Transactions on Computers.

[20]  Ivan Stojmenovic,et al.  Coordination in Sensor, Actuator, and Robot Networks , 2010 .

[21]  Peng Wang,et al.  Robust Accounting in Decentralized P2P Storage Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[22]  Yuguang Fang,et al.  A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[23]  Ravishankar K. Iyer,et al.  Inner-Circle Consistency for Wireless Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[24]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[25]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.