Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
An adaptive energy-efficient MAC protocol for wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
A Dynamic Trust Model for Mobile Ad Hoc Networks
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Reputation-Based Trust Mechanism for Ad Hoc Networks
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
Towards resilient geographic routing in WSNs
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Designing secure sensor networks
IEEE Wireless Communications
Hi-index | 0.00 |
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. The classical mechanisms, namely authentication and encryption, can prevent some outsider attacks; however, these mechanisms are inefficient in detecting selective forwarding attacks on compromised nodes. On the basis of these observations, we build a trust model to evaluate nodes behavior. Based on the trust model, a routing framework, TRUSTEE, is further proposed for secure routing. TRUSTEE provides a flexible and feasible approach to evaluate routes' quality and chooses route that best meets the security requirements. Keeping into mind the critical resource constraint nature of sensor network, we do not adopt the energy-consuming monitoring and trust recommendations mechanisms. Simulation and analysis verify TRUSTEE's performance, it not only minimizes resource consumption but also can prevent most outsider attacks, defend selective forwarding attacks and thus significantly increase the network throughput.