Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and increased reliability for a network. For trust generation, we employ subjective logic based calculations to mitigate trust fluctuations caused by internal and external factors. Numerical results based on synthetic data reveal the effectiveness and preciseness of our proposed schemes.

[1]  Yu-Kwong Kwok,et al.  A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[2]  Cyrus Shahabi,et al.  Exploiting spatial correlation towards an energy efficient clustered aggregation technique (CAG) [wireless sensor network applications] , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[3]  Shuang-Hua Yang,et al.  Wireless Sensor Networks: Principles, Design and Applications , 2013 .

[4]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[5]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[6]  Sajal K. Das,et al.  A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.

[7]  Avinash Srinivasan,et al.  iTrust: an integrated trust framework for wireless sensor networks , 2010, SAC '10.

[8]  Mary Ann Ingram,et al.  Residual-Energy-Activated Cooperative Transmission (REACT) to Avoid the Energy Hole , 2010, 2010 IEEE International Conference on Communications Workshops.

[9]  Frank Y. Li,et al.  Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs , 2013, Comput. Commun..

[10]  Frank Y. Li,et al.  A Novel Approach to Trust Management in Unattended Wireless Sensor Networks , 2014, IEEE Transactions on Mobile Computing.