Communications of the ACM
ICIS '00 Proceedings of the twenty first international conference on Information systems
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Attack-resilient hierarchical data aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Autonomous and distributed node recovery in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Key management for long-lived sensor networks in hostile environments
Computer Communications
Dynamic trust assessment of software services
2nd international workshop on Service oriented software engineering: in conjunction with the 6th ESEC/FSE joint meeting
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Analysis of ratings on trust inference in open environments
Performance Evaluation
IEEE Transactions on Mobile Computing
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
ACM Transactions on Information and System Security (TISSEC)
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
SNARE: sensor node attached reputation evaluator
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
ACM Transactions on Sensor Networks (TOSN)
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Scalable reputation management with trustworthy user selection for P2P MMOGs
International Journal of Advanced Media and Communication
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Proceedings of the 2009 ACM symposium on Applied Computing
TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Weighted trust evaluation-based malicious node detection for wireless sensor networks
International Journal of Information and Computer Security
Case study: trust establishment in personal area networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
A reputation-driven scheduler for autonomic and sustainable resource sharing in Grid computing
Journal of Parallel and Distributed Computing
Cooperation in underwater sensor networks
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
A trust establishment scheme for cluster-based sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
MSS: a multi-level data placement scheme for data survival in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Distributed cooperative transmission with unreliable and untrustworthy relay channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
Trust management systems for wireless sensor networks: Best practices
Computer Communications
iTrust: an integrated trust framework for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Secure and reliable data aggregation for wireless sensor networks
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Using learned data patterns to detect malicious nodes in sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
Integrated Computer-Aided Engineering
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust-aware in-network aggregation for wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
From time domain to space domain: detecting replica attacks in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
INFOCOM'10 Proceedings of the 29th conference on Information communications
Adaptive security level for data aggregation in wireless sensor networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Defending against physical destruction attacks on wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Information quality model and optimization for 802.15.4-based wireless sensor networks
Journal of Network and Computer Applications
Reputation modeling for wireless sensor networks
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
A variable weight based fuzzy data fusion algorithm for WSN
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Rescuing wireless sensor networks security from science fiction
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A versatile approach to combining trust values for making binary decisions
iTrust'06 Proceedings of the 4th international conference on Trust Management
Bayesian network based trust management
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Key management for mobile sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Secure and privacy-aware searching in peer-to-peer networks
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
Mixed-Strategy game based trust management for clustered wireless sensor networks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Research on secure data collection in wireless multimedia sensor networks
Computer Communications
A key revocation scheme for mobile sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Utility-driven evolution recommender for a constrained ontology
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
Dynamic camouflage event based malicious node detection architecture
The Journal of Supercomputing
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. Fundamental to this is the observation that cryptography cannot prevent malicious or non-malicious insertion of data from internal adversaries or faulty nodes. We believe that in general tools from different domains such as economics, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach for countering all types of misbehavior resulting from malicious and faulty nodes. We are currently developing a system within this framework where we employ a Bayesian formulation, specifically a beta reputation system, for reputation representation, updates and integration. We will explain the reasoning behind our design choices, analyzing their pros & cons. We conclude the paper by verifying the efficacy of this system through some preliminary simulation results.