COMPUTER SCIENCE AND TECHNOLOGY |
|
|
|
|
|
Node security model for wireless sensor networks based on a reputation system and data noise point detection technique |
FU Junsong, LIU Yun |
Key Laboratory of Communication and Information Systems of Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China |
|
|
Abstract The increased number of wireless sensor networks requires security for the sensor nodes. Since traditional information security systems based on cryptography cannot serve the complex safety issues threatening sensor nodes, the reputation system has been introduced into wireless sensor networks to periodically evaluate security nodes and assign reputation values. However, the reputation system cannot always distinguish some abnormal behavior in the sensor nodes, such as the monitoring data accuracy. As a result, some nodes can avoid monitoring by the reputation system which will affect user decisions. This paper presents a wireless sensor network node security model combining the reputation system with data noise detection. The reputation system provides the node reputations to the data noise detection model to more effectively detect data noise. The data noise detection model then feeds information back to the reputation system which accelerates the convergence rate of the reputation system. Simulations show that this node security model can simultaneously detect network and data attacks better than the traditional credit system model with a higher convergence rate.
|
Keywords
wireless sensor network
node security model
reputation system
data noise points detection
|
|
Issue Date: 15 January 2017
|
|
|
[1] |
Yu L, Wang N, Meng X. Real-time forest fire detection with wireless sensor networks[C]//International Conference on Wireless Communications, Networking and Mobile Computing, 2005. Shanghai:IEEE, 2005, 2:1214-1217.
|
[2] |
Mainwaring A, Culler D, Polastre J, et al. Wireless sensor networks for habitat monitoring[C]//Proceedings of the 1st ACM international Workshop on wireless sensor networks and applications. Atlanta, USA:ACM, 2002:88-97.
|
[3] |
Trossen D, Pavel D. Sensor networks, wearable computing, and healthcare applications[J]. Pervasive Computing, IEEE, 2007, 6(2):58-61.
|
[4] |
Herring C, Kaplan S. Component-based software systems for smart environments[J]. Personal Communications IEEE, 2000, 7(5):60-61.
|
[5] |
Perrig A, Szewczyk R, Tygar J D, et al. SPINS:Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5):521-534.
|
[6] |
Watro R, Kong D, Cuti S, et al. TinyPK:securing sensor networks with public key technology[C]//Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks. Washington, USA:ACM, 2004:59-64.
|
[7] |
Chen H, Han P, Yu B, et al. A new kind of session keys based on message scheme for sensor networks[C]//Asia-Pacific Conference Proceedings. Nanjing, China:IEEE, 2005:155-161.
|
[8] |
Ganeriwal S, Balzano L K, Srivastava M B. Reputation-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks (TOSN), 2008, 4(3):1-12.
|
[9] |
Ozdemir S. Functional reputation based data aggregation for wireless sensor networks[C]//IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008. Avignon, France:IEEE, 2008:592-597.
|
[10] |
Roy S, Conti M, Setia S, et al. Secure data aggregation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):1040-1052.
|
[11] |
Heinzelman W B, Chandrakasan A P, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks[J]. IEEE Transactions on Wireless Communications, 2002, 1(4):660-670.
|
[12] |
Younis O, Fahmy S. HEED:A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks[J]. IEEE Transactions on Mobile Computing, 2004, 3(4):366-379.
|
[13] |
Commerce B E, Jøsang A, Ismail R. The beta reputation system[C]//In Proceedings of the 15th Bled Electronic Commerce Conference. Bled, Slovenia:e-Reality, 2002:1-14.
|
[14] |
Ester, Martin, et al. A density-based algorithm for discovering clusters in large spatial databases with noise[C]//Knowledge Discovery and Data Mining. Portland, USA:ACM, 1996:1-6.
|
[15] |
Crosby G V, Pissinou N. Cluster-based reputation and trust for wireless sensor networks[C]//Consumer Communications and Networking Conference. Las Vegas, NV, USA:IEEE, 2007:604-608.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|