Robust Trust Mechanisms for Monitoring Aggregator Nodes in Sensor Networks
نویسندگان
چکیده
Sensor nodes are often deployed in large numbers to monitor extended sensor fields. In such scenarios data aggregation plays a crucial role on summarizing data forwarded to base stations in sensor networks. As sensor networks are commonly deployed in open and unattended areas, they are vulnerable to physical tampering as well as remote attacks. Existing security techniques focus primarily on methods used by an aggregator node to monitor and detect compromised behavior by nodes that report data to it. We propose a novel mechanism, combining techniques from statistics and artificial intelligence, by which nodes reporting to an aggregator node can monitor whether the latter is reporting incorrect aggregated values. In our framework, nodes are arranged in a hierarchy. We develop a reputation management scheme in which each child node keeps a reputation value of its parent. For each data reporting event, a node is privy only to the data value it reported and the aggregated value forwarded by its parent node. Each node then calculates the probability of the parent reporting correctly aggregated values over an epoch of events by adapting a statistical hypothesis testing scheme. This probability is used to incrementally update the trustworthiness of the parent node using a learning scheme. When the trustworthiness of a node falls below a threshold it can no longer be trusted with the aggregation task and should be reallocated or eliminated from the network. We evaluate the robustness of our adaptation of a couple of statistical hypothesis testing schemes and analyze their applicability for different types of malicious behaviors by compromised sensor nodes.
منابع مشابه
Random Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملRAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
In-network data aggregation has a great impact on the energy consumption in largescale wireless sensor networks. However, the resource constraints and vulnerable deployment environments challenge the application of this technique in terms of security and efficiency. A compromised node may forge arbitrary aggregation value and mislead the base station into trusting a false reading. In this paper...
متن کاملComparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible to physical damage or remote tampering. Generally, a hierarchical data collection scheme is used by the sensors to report data to the base station. It is difficult to precisely identify and eliminate a tampered node i...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008