SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An incentive compatible reputation mechanism
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
An Access Control Scheme in Wireless Sensor Networks
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
A role-based access in a hierarchical sensor network architecture to provide multilevel security
Computer Communications
LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
WIMOB '09 Proceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
A fuzzy logic-based energy efficient packet loss preventive routing protocol
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Computers and Electrical Engineering
Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks
Wireless Communications & Mobile Computing
The capacity of wireless networks
IEEE Transactions on Information Theory
IEEE Communications Magazine
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
IEEE Journal on Selected Areas in Communications
Average time synchronization in wireless sensor networks by pairwise messages
Computer Communications
Journal of Parallel and Distributed Computing
Hi-index | 0.24 |
Wireless sensor networks (WSNs) typically consist of large number of sensor nodes, which, depending on the application, are mostly left unattended in open environments for moderately long periods of time. Due to the wireless nature of the medium, it is quite possible that a node can be captured by an adversary, which may lead to its non-cooperative behavior or misbehavior with the rest of the nodes in the network. So, it is necessary to provide a security mechanism in the network that mandates only the authorized nodes to be able to access information. Some of the recent literature suggest using multilevel hierarchical architectures (MHA) in WSN. In such an approach, each group is assigned a task and a different role or level is assigned to nodes within a group. There exists a need for multilevel access control in these types of networks, in order to give authorization based on a node's role - this is also called role-based access control (RBAC). In this paper, we propose a reputation-based role assigning scheme for RBAC. The main objective of this scheme is to manage reputation locally with minimum communication and delay overhead and to assign appropriate role or level to the deserved nodes in order to increase the throughput of overall network. Other parameters used in our scheme are the bootstrap time and energy. In this paper, we describe our scheme and prove its theoretical correctness. Simulation results show that our scheme leads to an increase in throughput. This scheme leads to increase in throughput by around 32% at the consumption of little more energy.