Secure reputation monitoring system - a novel connected dominating set-based framework for WSNs
نویسندگان
چکیده
Reputation and Trust-based Monitoring Systems (RTMSs) have provided a ubiquitous framework for secure Wireless Sensor Network (WSN) computing. However, neighborhood monitoring, though useful, consumes substantial amounts of sensor resources. Therefore, employing sensors for neighborhood monitoring, which is secondary to their intended duties, depletes valuable and scarce resources. This eventually leads to shortened network lifetime, which is counter-productive in WSNs. In this paper, we propose a novel, Connected Dominating Set (CDS)-based reputation monitoring system. Our model is the first attempt to employ a CDS-based monitoring backbone to securely aggregate the reputation of sensors without subjecting them to energy depletion or reputation pollution attacks encountered in existing reputation monitoring systems. Secure and certificateless node mobility and robustness to node replication and ID spoofing attacks are two vital by-products of our model. We confirm the performance of our model via simulation studies. Copyright © 2010 John Wiley & Sons, Ltd.
منابع مشابه
Connected Dominating Sets
Wireless sensor networks (WSNs), consist of small nodes with sensing, computation, and wireless communications capabilities, are now widely used in many applications, including environment and habitat monitoring, traffic control, and etc. Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networ...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملDistributed Reputation-based Secure Localization in Sensor Networks
Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations like target tracking and land-mine detection where accurate location of sensors is vital. One common method of localization in literature uses a set of specialty nodes known as beacon nodes (BNs) that assist other sensor nodes (SNs) to determine their location. In ...
متن کاملIterative Local Solutions for Connected Dominating Sets in Ad Hoc Wireless Networks
In this paper, we propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). This approach uses an iterative application of a selected local solution. Each application of the local solution enhances the result obtained from the pre...
متن کاملConnected Dominating Set Based Topology Control in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network. Moreover, Minimum-sized Connected Dominating Set ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Security and Communication Networks
دوره 4 شماره
صفحات -
تاریخ انتشار 2011