Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their advantages with respect to classic sensor networks. However, nodes in a WSN cooperate and this exposes them to several security threats. Trust-based systems constitute an established solution to ensure security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer. We show how such attacks are tolerated with low overhead in comparison to unprotected systems. Preliminary experimental results are presented confirming the validity of the proposed approach.

[1]  Luigi Coppolino,et al.  An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).

[2]  Luigi Coppolino,et al.  Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[3]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[4]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Michael Rovatsos,et al.  Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..

[6]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[7]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[8]  Min Wei,et al.  Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[9]  Jie Wu,et al.  Secure and reliable broadcasting in wireless sensor networks using multi-parent trees , 2009, Secur. Commun. Networks.

[10]  Andrea Bondavalli,et al.  A hidden Markov model based intrusion detection system for wireless sensor networks , 2012, Int. J. Crit. Comput. Based Syst..

[11]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[12]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[13]  Luigi Coppolino,et al.  A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures , 2012, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering.

[14]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[15]  Andrea Bondavalli,et al.  Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[16]  Mohamed Eltoweissy,et al.  μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[17]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[18]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.