Comparing trust mechanisms for monitoring aggregator nodes in sensor networks

  • Authors:
  • Oly Mistry;Anil Gürsel;Sandip Sen

  • Affiliations:
  • The University of Tulsa, Tulsa, OK;The University of Tulsa, Tulsa, OK;The University of Tulsa, Tulsa, OK

  • Venue:
  • Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible to physical damage or remote tampering. Generally, a hierarchical data collection scheme is used by the sensors to report data to the base station. It is difficult to precisely identify and eliminate a tampered node in such a data collecting hierarchy. Most security schemes for sensor networks focuses on developing mechanism for nodes located higher in the hierarchy to monitor those located at lower levels. We propose a complementary mechanism with which the nodes at lower levels can monitor their parents in the hierarchy to detect malicious behavior. Every node maintains a reputation value of its parent and updates this at the end of every data reporting cycle. We propose a novel combination of statistical testing techniques and existing reputation management and reinforcement learning schemes to manage the reputation of a parent node. The probability that the parent node is malicious is calculated using various combination of the Q-learning algorithm and the β-Reputation scheme. The input to the β-Reputation scheme is a history of boolean events consisting of correct or erroneous data reporting events by the parent node. The boolean events are generated at each data reporting period using statistical tests. Our approach can be viewed as a mechanism composed of different modules for the detection of a malicious event, interpretation of the malicious event and updating node reputation value based on the interpretation. We have created different versions of our system by varying these components. We compared the effectiveness of these alternative designs in detecting different types of malicious behavior in sensor networks.