A Survey of Provenance Leveraged Trust in Wireless Sensor Networks

A wireless sensor network is a collection of self-organized sensor nodes. WSNs have many challenges such as lack of a centralized network administration, absence of infrastructure, low data transmission capacity, low bandwidth, mobility, lack of connectivity, limited power supply and dynamic network topology. Due to this vulnerable nature, WSNs need a trust architecture to keep the quality of the network data high for a longer time. In this work, we aim to survey the proposed trust architectures for WSNs. Provenance can play a key role in assessing trust in these architectures. However not many research have leveraged provenance for trust in WSNs. We also aim to point out this gap in the field and encourage researchers to invest in this topic. To our knowledge our work is unique and provenance leveraged trust work in WSNs has not been surveyed before. Keywords: Provenance, Trust, Wireless Sensor Networks

[1]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Dan Zhou Security issues in ad hoc networks , 2003 .

[3]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[4]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[5]  Wang Chiew Tan Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..

[6]  Elisa Bertino,et al.  Research issues in data provenance for streaming environments , 2009, SPRINGL '09.

[7]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.

[8]  Yu-Kwong Kwok,et al.  A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[9]  Audun Jøsang,et al.  Analysing the Relationship between Risk and Trust , 2004, iTrust.

[10]  Guillermo A. Francia A Wireless Sensor Network , 2003, International Conference on Wireless Networks.

[11]  Jie Wu,et al.  A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[12]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[13]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[14]  Xiaozhou Li,et al.  Efficient querying and maintenance of network provenance at internet-scale , 2010, SIGMOD Conference.

[15]  Saurabh Bagchi,et al.  TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[16]  Rodrigo Roman,et al.  A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[17]  Kiyoung Kim,et al.  A security framework with trust management for sensor networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[18]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[19]  Ian Foster,et al.  Special Issue: The First Provenance Challenge , 2008 .

[20]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[21]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[22]  Yogesh L. Simmhan,et al.  Special Issue: The First Provenance Challenge , 2008, Concurr. Comput. Pract. Exp..

[23]  Prasant Mohapatra,et al.  PRONET: Network trust assessment based on incomplete provenance , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[24]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[25]  Sima Security Issues in Ad Hoc Networks , 2011 .

[26]  Prasant Mohapatra,et al.  Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[27]  Boon Thau Loo,et al.  Provenance-Aware Declarative Secure Networks , 2007 .

[28]  Elisa Bertino,et al.  Trust Evaluation of Data Provenance , 2008 .

[29]  Sanjay Kumar Madria,et al.  Sensor networks: an overview , 2003 .

[30]  B. Solhaug,et al.  Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[31]  Jennifer Golbeck,et al.  Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering , 2006, IPAW.

[32]  Suat Özdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008, Comput. Commun..

[33]  Peter Buneman,et al.  Provenance in databases , 2009, SIGMOD '07.

[34]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[35]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[36]  Kurt Rothermel,et al.  Towards a Generic Trust Model - Comparison of Various Trust Update Algorithms , 2005, iTrust.

[37]  Mark G. Terwilliger,et al.  Overview of Sensor Networks , 2004 .

[38]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[39]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[40]  Juliana Freire,et al.  Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.

[41]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[42]  R-J. de Lange,et al.  Provenance aware sensor networks for real-time data analysis , 2010 .

[43]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[44]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[45]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[46]  Boon Thau Loo,et al.  Provenance-aware secure networks , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.

[47]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[48]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[49]  Diego Gambetta Can We Trust Trust , 2000 .

[50]  Jochen Mundinger,et al.  Reputation in self-organized communication systems and beyond , 2006 .

[51]  Liudong Xing,et al.  Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[52]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .

[53]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[54]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[55]  Matt Welsh,et al.  Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[56]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[57]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[58]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[59]  C Kajubi On establishing trust. , 1999, The Mount Sinai journal of medicine, New York.

[60]  Evangelos Kotsovinos,et al.  BambooTrust: practical scalable trust management for global public computing , 2006, SAC.

[61]  Prasant Mohapatra,et al.  Evaluation of network trust using provenance based on distributed local intelligence , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[62]  Julita Vassileva,et al.  Bayesian network-based trust model , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).

[63]  Mike Burmester,et al.  Security Issues in Ad-Hoc Networks , 2008 .

[64]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[65]  M. Welsh,et al.  Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[66]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[67]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[68]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[69]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[70]  Fred Busch,et al.  Talking to strangers , 1981 .

[71]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[72]  Steven D. Glaser,et al.  Some real-world applications of wireless sensor nodes , 2004, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.

[73]  Zachary G. Ives,et al.  ORCHESTRA: Rapid, Collaborative Sharing of Dynamic Data , 2005, CIDR.

[74]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[75]  Edgar H. Callaway,et al.  Wireless Sensor Networks: Architectures and Protocols , 2003 .

[76]  Norman L. Chervany,et al.  Conceptualizing trust: a typology and e-commerce customer relationships model , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[77]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[78]  S. Challa,et al.  RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[79]  R. Govindan,et al.  A PROGRAMMABLE WIRELESS SENSING SYSTEM FOR STRUCTURAL MONITORING , 2022 .

[80]  Marianne Winslett,et al.  Preventing history forgery with secure provenance , 2009, TOS.

[81]  Jeremy J. Carroll,et al.  Named graphs, provenance and trust , 2005, WWW '05.

[82]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[83]  Warren E. Walker,et al.  Defining Uncertainty: A Conceptual Basis for Uncertainty Management in Model-Based Decision Support , 2003 .

[84]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[85]  Paul T. Groth,et al.  The provenance of electronic data , 2008, CACM.

[86]  Jennifer Widom,et al.  Tracing the lineage of view data in a warehousing environment , 2000, TODS.

[87]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[88]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[89]  Johnson I. Agbinya,et al.  A New Algorithm of Trust Formation in Wireless Sensor Networks , 2007 .

[90]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[91]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[92]  Daniele Quercia,et al.  B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.