Abstract
Wireless Sensor Networks are often deployed in unattended and hostile environments. These networks are susceptible to harsh physical conditions and attacks from adversaries. Sensor nodes have limited power, memory and computational ability and thus are vulnerable to capture. A few malicious adversaries can easily compromise sensor devices and inject false data to disrupt the integrity of the network. In this paper, we address this problem by proposing a three tiered architecture established upon a trust based framework which distinguishes illegal nodes from legal ones and filters out deceitful and forged data. Simulation results demonstrate that our trust based framework is an efficient approach to identify the trustworthiness of data.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: a survey. Computer Networks Journal 38, 393–422 (2002)
Gupta, P., Kumar, P.: The capacity of wireless networks. IEEE Transactions on Information Theory IT-46(2), 388–404 (2000)
Johnson, D., Maltz, D., Broch, J.: DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, pp. 139–172. Addison-Wesley (2001)
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy efficient Communication Protocol for Wireless Micro sensor Networks. In: Proceedings of Hawaii International Conference on System Science (HICSS), Maui, Hawaii, pp. 3005–3014 (2000)
Hussain, S., Mallinson, M., Drane, P.: Discrete radio power level consumption model in wireless sensor networks. In: Workshop Proceedings of the Fourth IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS (2007)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: IEEE Symp. Security and Privacy (May 2003)
Du, W., et al.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. 10th ACM Conf. Comp. and Commun. Security, pp. 42–51 (October 2003)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. 9th ACM Conf. Comp. and Commun. Security, pp. 41–47 (November 2002)
Atakli, I., Hu, H., Chen, Y., Ku, W., Su, Z.: Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation. In: The Symposium on Simulation of Systems Security (January 2008)
Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: The 7th International Conference on Advanced Communication Technology, ICAT 2005, pp. 491–496 (July 2005)
Zhang, W., Das, S., Liu, Y.: A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON (2006)
Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: empirical analysis of eBays reputation system. In: Baye, M.R. (ed.) Advances in Applied Microeconomics, vol. 11. Elsevier Science (2003)
Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: Proc. of IEEE Conference on Ecommerce 2003, p. 275 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chakrabarti, A., Parekh, V., Ruia, A. (2012). A Trust Based Routing Scheme for Wireless Sensor Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-27299-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27298-1
Online ISBN: 978-3-642-27299-8
eBook Packages: Computer ScienceComputer Science (R0)