{"title":"无线传感器网络中的可靠信任管理方案","authors":"Nabila Labraoui","doi":"10.1109/ISPS.2015.7244958","DOIUrl":null,"url":null,"abstract":"Physical security of wireless sensor nodes cannot be provided because making sensor nodes tamperproof is prohibitively expensive. Due to this lack of physical security, intruders can easily compromise one or more sensor nodes to subvert network operations bypassing encryption and password security systems. Trust and reputation systems have been recently suggested as an effective security mechanism to overcome the shortcomings of cryptography-based schemes in securing wireless sensor networks (WSNs). Although researchers have been studying the problem of trust modeling and management in WSNs for over a decade, their focus was on trust based only on reputation which is by itself not sensitive enough to perceive suddenly spoiled nodes that may launch intelligent attacks against a trust-establishment mechanism. In this paper, we present a Trust Model based on Risk evaluation (TMR) to effectively deal with conflicting behaviors of malicious nodes. Unfortunately, risk factor evaluation can make the trust model more reliable because it becomes more sensitive to on-off attack.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"4 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"A reliable trust management scheme in wireless sensor networks\",\"authors\":\"Nabila Labraoui\",\"doi\":\"10.1109/ISPS.2015.7244958\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical security of wireless sensor nodes cannot be provided because making sensor nodes tamperproof is prohibitively expensive. Due to this lack of physical security, intruders can easily compromise one or more sensor nodes to subvert network operations bypassing encryption and password security systems. Trust and reputation systems have been recently suggested as an effective security mechanism to overcome the shortcomings of cryptography-based schemes in securing wireless sensor networks (WSNs). Although researchers have been studying the problem of trust modeling and management in WSNs for over a decade, their focus was on trust based only on reputation which is by itself not sensitive enough to perceive suddenly spoiled nodes that may launch intelligent attacks against a trust-establishment mechanism. In this paper, we present a Trust Model based on Risk evaluation (TMR) to effectively deal with conflicting behaviors of malicious nodes. Unfortunately, risk factor evaluation can make the trust model more reliable because it becomes more sensitive to on-off attack.\",\"PeriodicalId\":165465,\"journal\":{\"name\":\"2015 12th International Symposium on Programming and Systems (ISPS)\",\"volume\":\"4 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 12th International Symposium on Programming and Systems (ISPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPS.2015.7244958\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 12th International Symposium on Programming and Systems (ISPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPS.2015.7244958","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A reliable trust management scheme in wireless sensor networks
Physical security of wireless sensor nodes cannot be provided because making sensor nodes tamperproof is prohibitively expensive. Due to this lack of physical security, intruders can easily compromise one or more sensor nodes to subvert network operations bypassing encryption and password security systems. Trust and reputation systems have been recently suggested as an effective security mechanism to overcome the shortcomings of cryptography-based schemes in securing wireless sensor networks (WSNs). Although researchers have been studying the problem of trust modeling and management in WSNs for over a decade, their focus was on trust based only on reputation which is by itself not sensitive enough to perceive suddenly spoiled nodes that may launch intelligent attacks against a trust-establishment mechanism. In this paper, we present a Trust Model based on Risk evaluation (TMR) to effectively deal with conflicting behaviors of malicious nodes. Unfortunately, risk factor evaluation can make the trust model more reliable because it becomes more sensitive to on-off attack.