Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
On the optimal allocation of adversarial resources
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
Secure cluster header election techniques in sensor network
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
The resource-constrained sensors in mission-critical applications are subject to both random failures and intentional compromise, which poses severe security threats in wireless sensor networks (WSNs). The different types of security threats have been identified and addressed in an individual manner in the past. In this paper, we argue that cryptography alone is insufficient to fully address the insider attacks in the existence of both the compromised and faulty sensor nodes. We further propose a proactive data security framework (PDSF) to identify compromised and faulty nodes proactively and prohibit them from participating network activities in a dynamic manner. The rationale behind our approach is that a sensor's future behavior can be predicted (at least) probabilistically by its past behavior. PDSF is divided into two key modules, that is, misbehavior characterization & monitoring, and trust management. PDSF characterizes different types of misbehavior in WSNs and defines a set of monitoring criteria. PDSF also develops a trust management model, which adapts to the resource constrained nature of the WSNs.