The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.11 - November (2009 vol.20)
pp: 1698-1712
Riaz Ahmed Shaikh , KyungHee University, Suwon
Hassan Jameel , KyungHee University, Suwon
Brian J. d'Auriol , KyungHee University, Suwon
Heejo Lee , Korea University, Seoul
Sungyoung Lee , KyungHee University, Suwon
Young-Jae Song , KyungHee University, Suwon
ABSTRACT
Traditional trust management schemes developed for wired and wireless ad hoc networks are not well suited for sensor networks due to their higher consumption of resources such as memory and power. In this work, we propose a new lightweight Group-based Trust Management Scheme (GTMS) for wireless sensor networks, which employs clustering. Our approach reduces the cost of trust evaluation. Also, theoretical as well as simulation results show that our scheme demands less memory, energy, and communication overheads as compared to the current state-of-the-art trust management schemes and it is more suitable for large-scale sensor networks. Furthermore, GTMS also enables us to detect and prevent malicious, selfish, and faulty nodes.
INDEX TERMS
Trust evaluation, trust modeling, trust management, security, sensor networks.
CITATION
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song, "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.20, no. 11, pp. 1698-1712, November 2009, doi:10.1109/TPDS.2008.258
REFERENCES
[1] L.J. Hoffman, K. Lawson-Jenkins, and J. Blum, “Trust beyond Security: An Expanded Trust Model,” Comm. ACM, vol. 49, no. 7, pp. 95-101, July 2006.
[2] E. Shi and A. Perrig, “Designing Secure Sensor Networks,” IEEE Wireless Comm., vol. 11, no. 6, pp. 38-43, 2004.
[3] H.S. Ng, M.L. Sim, and C.M. Tan, “Security Issues of Wireless Sensor Networks in Healthcare Applications,” BT Technology J., vol. 24, no. 2, pp. 138-144, Apr. 2006.
[4] A.A. Pirzada and C. McDonald, “Establishing Trust in Pure Ad-Hoc Networks,” Proc. 27th Australasian Computer Science Conf. (ACSC '04), pp. 47-54, Jan. 2004.
[5] Y.L. Sun, W. Yu, Z. Han, and K.J.R. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp.305-317, Feb. 2006.
[6] R.A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y.J. Song, “Trust Management Problem in Distributed Wireless Sensor Networks,” Proc. 12th IEEE Int'l Conf. Embedded Real-Time Computing Systems and Applications (RTCSA '06), pp. 411-414, Aug. 2006.
[7] M. Momani, S. Challa, and K. Aboura, “Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective,” Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecomm., T.S. et al., ed., pp.317-321, Springer, 2007.
[8] J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Chapter 16: Wireless Sensor Network Security: A Survey,” Security in Distributed, Grid, and Pervasive Computing, Y. Xiao, ed., pp. 367-410, CRC Press, 2006.
[9] Z. Liu, A.W. Joy, and R.A. Thompson, “A Dynamic Trust Model for Mobile Ad Hoc Networks,” Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04), pp.80-85, May 2004.
[10] S. Buchegger and J.-Y.L. Boudec, “Self-Policing Mobile Ad Hoc Networks by Reputation Systems,” IEEE Comm. Magazine, vol. 43, no. 7, pp. 101-107, July 2005.
[11] T. Grandison and M. Sloman, “A Survey of Trust in Internet Applications,” IEEE Comm. Surveys and Tutorials, vol. 3, no. 4, 2000.
[12] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
[13] S. Lindsey, C. Raghavendra, and S. Raghavendra, “PEGASIS— Power-Efficient Gathering in Sensor Information Systems,” Proc. IEEE Aerospace Conf., vol. 3, pp. 1125-1130, 2002.
[14] A. Manjeshwar and D.P. Agrawal, “TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks,” Proc. 15th Int'l Parallel and Distributed Processing Symp. (IPDPS '01), pp. 2009-2015, Apr. 2001.
[15] O. Younis and S. Fahmy, “HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-Hoc Sensor Networks,” IEEE Trans. Mobile Computing, vol. 3, no. 4, pp. 366-379, Oct. 2004.
[16] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge,” IEEE Trans. Dependable and Secure Computing, vol. 3, no. 1, pp. 62-77, Jan.-Mar. 2006.
[17] M. Shehab, E. Bertino, and A. Ghafoor, “Efficient Hierarchical Key Generation and Key Diffusion for Sensor Networks,” Proc. Second Ann. IEEE Conf. Sensor and Ad Hoc Comm. and Networks (SECON'05), pp. 197-213, Sept. 2005.
[18] S. Bandyopadhyay and E.J. Coyle, “Minimizing Communication Costs in Hierarchically-Clustered Networks of Wireless Sensors,” Computer Networks, vol. 44, no. 1, pp. 1-16, 2004.
[19] M. Gupta, P. Judge, and M. Ammar, “A Reputation System for Peer-to-Peer Networks,” Proc. 13th Int'l Workshop Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '03), pp. 144-152, June 2003.
[20] D. Ingram, “An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks,” Proc. Third Int'l Conf. Trust Management, pp. 273-288, May 2005.
[21] L. Xiong and L. Liu, “Peer Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, July 2004.
[22] G. Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
[23] S. Buchegger and J.-Y.L. Boudec, “A Robust Reputation System for Peer-to-Peer and Mobile Ad-Hoc Networks,” Proc. Second Workshop Economics of Peer-to-Peer Systems (P2PEcon '04), June 2004.
[24] S. Ganeriwal and M.B. Srivastava, “Reputation-Based Framework for High Integrity Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 66-67, Oct. 2004.
[25] A. Boukerche, X. Li, and K. EL-Khatib, “Trust-Based Security for Wireless Ad Hoc and Sensor Networks,” Computer Comm., vol. 30, pp. 2413-2427, Sept. 2007.
[26] Z. Yao, D. Kim, and Y. Doh, “PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security,” Proc. Third IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS '06), pp. 437-446, Oct. 2006.
[27] K. Liu, N. Abu-Ghazaleh, and K.-D. Kang, “Location Verification and Trust Management for Resilient Geographic Routing,” J.Parallel and Distributed Computing, vol. 67, no. 2, pp. 215-228, 2007.
[28] H. Chen, H. Wu, X. Zhou, and C. Gao, “Reputation-Based Trust in Wireless Sensor Networks,” Proc. Int'l Conf. Multimedia and Ubiquitous Eng. (MUE '07), pp. 603-607, Apr. 2007.
[29] H. Jameel, L.X. Hung, U. Kalim, A. Sajjad, S. Lee, and Y.-K. Lee, “A Trust Model for Ubiquitous Systems Based on Vectors of Trust Values,” Proc. Third IEEE Int'l Security in Storage Workshop (SISW'05), pp. 674-679, Dec. 2005.
[30] R.A. Shaikh, S. Lee, M.A.U. Khan, and Y.J. Song, “LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network,” Proc. 11th IFIP Int'l Conf. Personal Wireless Comm. (PWC'06), pp. 367-377, Sept. 2006.
[31] A. Hac, Wireless Sensor Network Designs. John Wiley & Sons, 2003.
[32] R. Shah and J. Rabaey, “Energy Aware Routing for Low Energy Ad Hoc Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '02), pp. 350-355, 2002.
[33] S. Muruganathan, D. Ma, R. Bhasin, and A. Fapojuwo, “A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks,” IEEE Comm. Magazine, vol. 43, no. 3, pp. 8-13, 2005.
[34] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[35] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 62-72, 2003.
[36] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003.
[37] C. Karlof, N. Sastry, and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,” Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys '04), pp.162-175, Nov. 2004.
[38] H. Tijms, Understanding Probability: Chance Rules in Everyday Life. Cambridge Univ. Press, 2004.
[39] Xbow, mica2 series, http:/www.xbow.com, 2008.
[40] B.K. Szymanski, SENSE: Sensor Network Simulator and Emulator, http://www.ita.cs.rpi.edu/senseindex.html , 2008.
[41] S. Olariu, Q. Xu, M. Eltoweissy, A. Wadaa, and A.Y. Zomaya, “Protecting the Communication Structure in Sensor Networks,” Int'l J. Distributed Sensor Networks, vol. 1, pp. 187-203, 2005.
[42] S. Misra and G. Xue, “Efficient Anonymity Schemes for Clustered Wireless Sensor Networks,” Int'l J. Sensor Networks, vol. 1, nos. 1/2, pp. 50-63, 2006.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool