A rank-based application-driven resilient reputation framework model for wireless sensor networks

The security of wireless sensor networks is an important field of research about WSNs, and has attracted a lot of attentions nowadays. Reputation based trust systems represent soft security mechanisms that complement traditional information security. Nowadays, the research of trust security mechanism based on reputation and has become a hot research issue in wireless networks. In this paper, we propose a new security protocol RARRM to construct trustworthy sensor networks. This protocol not only can distinguish different applications, but also can rank trust values. The objective of this protocol is not only to encourage nodes to provide good services consecutively to establish a security environment of network, but also to punish strictly those malicious nodes that are trying to take advantage of reputation system to launch malicious attacks. Through intensive simulation, we will verify the correctness and efficiency of the proposed defense techniques.

[1]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Fang Liu,et al.  Location-aware key establishment in wireless sensor networks , 2006, IWCMC '06.

[4]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[5]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[6]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[7]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[8]  M. Castillo-Effer,et al.  Wireless sensor networks for flash-flood alerting , 2004, Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, 2004..

[9]  Arno Wacker,et al.  A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.

[10]  B. Mukherjee,et al.  Analysis of a prediction-based mobility adaptive tracking algorithm , 2005, 2nd International Conference on Broadband Networks, 2005..

[11]  Gyula Simon,et al.  Sensor network-based countersniper system , 2004, SenSys '04.

[12]  John S. J. Hsu,et al.  Bayesian Methods: An Analysis for Statisticians and Interdisciplinary Researchers , 1999 .

[13]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[16]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.