Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2017, Vol. 57 Issue (1) : 24-27     DOI: 10.16511/j.cnki.qhdxxb.2017.21.005
COMPUTER SCIENCE AND TECHNOLOGY |
Node security model for wireless sensor networks based on a reputation system and data noise point detection technique
FU Junsong, LIU Yun
Key Laboratory of Communication and Information Systems of Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China
Download: PDF(1030 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  The increased number of wireless sensor networks requires security for the sensor nodes. Since traditional information security systems based on cryptography cannot serve the complex safety issues threatening sensor nodes, the reputation system has been introduced into wireless sensor networks to periodically evaluate security nodes and assign reputation values. However, the reputation system cannot always distinguish some abnormal behavior in the sensor nodes, such as the monitoring data accuracy. As a result, some nodes can avoid monitoring by the reputation system which will affect user decisions. This paper presents a wireless sensor network node security model combining the reputation system with data noise detection. The reputation system provides the node reputations to the data noise detection model to more effectively detect data noise. The data noise detection model then feeds information back to the reputation system which accelerates the convergence rate of the reputation system. Simulations show that this node security model can simultaneously detect network and data attacks better than the traditional credit system model with a higher convergence rate.
Keywords wireless sensor network      node security model      reputation system      data noise points detection     
ZTFLH:  TN929.5  
Issue Date: 15 January 2017
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
FU Junsong
LIU Yun
Cite this article:   
FU Junsong,LIU Yun. Node security model for wireless sensor networks based on a reputation system and data noise point detection technique[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 24-27.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2017.21.005     OR     http://jst.tsinghuajournals.com/EN/Y2017/V57/I1/24
  
  
  
  
[1] Yu L, Wang N, Meng X. Real-time forest fire detection with wireless sensor networks[C]//International Conference on Wireless Communications, Networking and Mobile Computing, 2005. Shanghai:IEEE, 2005, 2:1214-1217.
[2] Mainwaring A, Culler D, Polastre J, et al. Wireless sensor networks for habitat monitoring[C]//Proceedings of the 1st ACM international Workshop on wireless sensor networks and applications. Atlanta, USA:ACM, 2002:88-97.
[3] Trossen D, Pavel D. Sensor networks, wearable computing, and healthcare applications[J]. Pervasive Computing, IEEE, 2007, 6(2):58-61.
[4] Herring C, Kaplan S. Component-based software systems for smart environments[J]. Personal Communications IEEE, 2000, 7(5):60-61.
[5] Perrig A, Szewczyk R, Tygar J D, et al. SPINS:Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5):521-534.
[6] Watro R, Kong D, Cuti S, et al. TinyPK:securing sensor networks with public key technology[C]//Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks. Washington, USA:ACM, 2004:59-64.
[7] Chen H, Han P, Yu B, et al. A new kind of session keys based on message scheme for sensor networks[C]//Asia-Pacific Conference Proceedings. Nanjing, China:IEEE, 2005:155-161.
[8] Ganeriwal S, Balzano L K, Srivastava M B. Reputation-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks (TOSN), 2008, 4(3):1-12.
[9] Ozdemir S. Functional reputation based data aggregation for wireless sensor networks[C]//IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008. Avignon, France:IEEE, 2008:592-597.
[10] Roy S, Conti M, Setia S, et al. Secure data aggregation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):1040-1052.
[11] Heinzelman W B, Chandrakasan A P, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks[J]. IEEE Transactions on Wireless Communications, 2002, 1(4):660-670.
[12] Younis O, Fahmy S. HEED:A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks[J]. IEEE Transactions on Mobile Computing, 2004, 3(4):366-379.
[13] Commerce B E, Jøsang A, Ismail R. The beta reputation system[C]//In Proceedings of the 15th Bled Electronic Commerce Conference. Bled, Slovenia:e-Reality, 2002:1-14.
[14] Ester, Martin, et al. A density-based algorithm for discovering clusters in large spatial databases with noise[C]//Knowledge Discovery and Data Mining. Portland, USA:ACM, 1996:1-6.
[15] Crosby G V, Pissinou N. Cluster-based reputation and trust for wireless sensor networks[C]//Consumer Communications and Networking Conference. Las Vegas, NV, USA:IEEE, 2007:604-608.
[1] MA Rui, ZHU Tianbao, MA Ke, HU Changzhen, ZHAO Xiaolin. Single-witness-based distributed detection for node replication attack[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 909-913,920.
[2] MAN Dapeng, WANG Chenye, YANG Wu, WANG Wei, XUAN Shichang, JIN Xiaopeng. Energy-efficient cluster-based privacy data aggregation for wireless sensor networks[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(2): 213-219.
[3] ZHOU Caiqiu, YANG Yuwang, WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 39-43.
[4] CAI Jie, GU Ming. Performance analysis of star topology wireless sensor networks based on IEEE 802.15.4[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(5): 565-571.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd