Mobile Networks Trust management in wireless sensor networks
T. Zahariadis, H. Leligou, P. Trakadas, S. Voliotis
{"title":"Mobile Networks Trust management in wireless sensor networks","authors":"T. Zahariadis, H. Leligou, P. Trakadas, S. Voliotis","doi":"10.1002/ett.1413","DOIUrl":null,"url":null,"abstract":"SUMMARY The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node’s trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd.","PeriodicalId":50473,"journal":{"name":"European Transactions on Telecommunications","volume":"49 1","pages":"386-395"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"114","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Transactions on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/ett.1413","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 114
Abstract
SUMMARY The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node’s trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd.
无线传感器网络中的信任管理
无线传感器网络的应用范围是如此之广,以至于它几乎侵入了我们的日常生活。未来,传感器网络将调查我们的健康、我们的家、我们走过的道路、我们工作的办公室或行业,甚至我们使用的飞机,以试图提高我们的安全。然而,无线传感器网络本身就容易受到安全攻击。安全攻击的清单虽然已经很长,但仍在继续增加,阻碍这些网络的扩展。信任管理方案包含一个强大的工具,用于检测意外节点行为(错误或恶意)。一旦检测到行为不端的节点,它们的邻居可以利用这些信息来避免与它们合作,无论是数据转发、数据聚合还是任何其他合作功能。文献中已经提出了各种信任模型,这些模型遵循不同方向,涉及测量功能的分布、被监控的行为以及测量用于计算/定义节点可信度的方式。在本文中,我们调查了信任模型,试图探索实现需求,资源消耗和实现安全性之间的相互作用。我们的目标是根据可用的节点和网络功能以及应用程序特性,为可部署信任模型设计的设计制定指导方针。版权所有©2010 John Wiley & Sons, Ltd
本文章由计算机程序翻译,如有差异,请以英文原文为准。