Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2017

09.03.2016

MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks

verfasst von: Gulustan Dogan, Koksal Avincan

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trust is an important factor in Wireless Sensor Networks in order to assess the believability of the produced data. Due to the limited computational power and energy resources of the wireless sensor networks, it is a challenge to maintain trust while using the energy efficiently. Previously we developed a trust enhancing one-hop architecture called ProTru. In order to make the architecture more efficient for multi-hop WSNs, we developed a two-hop version of our previous architecture called MultiProTru. In this architecture routing is done based on the trust values of the cluster heads. One other difference of MultiProTru is to find untrusted data we use Kalman filtering approach whereas in ProTru uses Random Sample Consensus algorithm. We compared the effectiveness of MultiProTru with ProTru, ProTruKa and a current trust architecture called an Efficient Distributed Trust Model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Eschenauer L, Gligor V, Baras J (2004) On trust establishment in mobile ad-hoc networks. In: Security Protocols. Springer, pp 47–66 Eschenauer L, Gligor V, Baras J (2004) On trust establishment in mobile ad-hoc networks. In: Security Protocols. Springer, pp 47–66
2.
Zurück zum Zitat Dogan G (2013) Protru: Leveraging provenance to enhance network trust in a wireless sensor network. City University of New York Dogan G (2013) Protru: Leveraging provenance to enhance network trust in a wireless sensor network. City University of New York
3.
Zurück zum Zitat Rani U, Sundaram S (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8(2) Rani U, Sundaram S (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8(2)
4.
Zurück zum Zitat Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3):15 Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3):15
5.
Zurück zum Zitat Marzi H, Li M (2013) An enhanced bio-inspired trust and reputation model for wireless sensor network. Proc Comput Sci 19:1159–1166CrossRef Marzi H, Li M (2013) An enhanced bio-inspired trust and reputation model for wireless sensor network. Proc Comput Sci 19:1159–1166CrossRef
6.
Zurück zum Zitat Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237CrossRef Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237CrossRef
7.
Zurück zum Zitat Liu X, Baras JS (2014) Using trust in distributed consensus with adversaries in sensor and other networks. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE, pp 1–7 Liu X, Baras JS (2014) Using trust in distributed consensus with adversaries in sensor and other networks. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE, pp 1–7
8.
Zurück zum Zitat Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, pp 277–283 Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, pp 277–283
9.
Zurück zum Zitat Dai C, Lin D, Bertino E, Kantarcioglu M (2008) Trust evaluation of data provenance. Technical Report, Technical Report CERIAS TR 2001-147, Purdue University Dai C, Lin D, Bertino E, Kantarcioglu M (2008) Trust evaluation of data provenance. Technical Report, Technical Report CERIAS TR 2001-147, Purdue University
10.
Zurück zum Zitat Lim HS, Moon YS, Bertino E (2009) Research issues in data provenance for streaming environments. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. ACM, p 58–62 Lim HS, Moon YS, Bertino E (2009) Research issues in data provenance for streaming environments. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. ACM, p 58–62
11.
Zurück zum Zitat Lim HS, Moon YS, Bertino E (2010) Assessing the Trustworthiness of Streaming Data. Technical Report, Technical Report TR 2010-09, CERIAS, 2010 Lim HS, Moon YS, Bertino E (2010) Assessing the Trustworthiness of Streaming Data. Technical Report, Technical Report TR 2010-09, CERIAS, 2010
12.
Zurück zum Zitat Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu YC (2005) Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks. In: International Conference on Dependable Systems and Networks. IEEE, pp 672–681 Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu YC (2005) Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks. In: International Conference on Dependable Systems and Networks. IEEE, pp 672–681
13.
Zurück zum Zitat Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 2006. DSSNS 2006. IEEE , p 10–pp Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 2006. DSSNS 2006. IEEE , p 10–pp
14.
Zurück zum Zitat Hur J, Lee Y, Yoon H, Choi D, Jin S (2005) Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005, volume 1. IEEE, pp 491–496 Hur J, Lee Y, Yoon H, Choi D, Jin S (2005) Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005, volume 1. IEEE, pp 491–496
15.
Zurück zum Zitat Dogan G, Brown T, Govindan K, Khan MMH, Abdelzaher T, Mohapatra P, Cho JH (2011) Evaluation of network trust using provenance based on distributed local intelligence. In: Military Communications Conference. IEEE Dogan G, Brown T, Govindan K, Khan MMH, Abdelzaher T, Mohapatra P, Cho JH (2011) Evaluation of network trust using provenance based on distributed local intelligence. In: Military Communications Conference. IEEE
16.
Zurück zum Zitat Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE, pp 603–607 Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE, pp 603–607
17.
Zurück zum Zitat Xiao XY, Peng WC, Hung CC, Lee WC (2007) Using sensorranks for in-network detection of faulty readings in wireless sensor networks. In: proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access. ACM , pp 1–8 Xiao XY, Peng WC, Hung CC, Lee WC (2007) Using sensorranks for in-network detection of faulty readings in wireless sensor networks. In: proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access. ACM , pp 1–8
18.
Zurück zum Zitat Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: International Conference on Performance, Computing, and Communications. IEEE, pp 463–469 Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: International Conference on Performance, Computing, and Communications. IEEE, pp 463–469
19.
Zurück zum Zitat Srinivasan A, Li F, Wu J (2008) A novel cds-based reputation monitoring system for wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS’08. IEEE, pp 364–369 Srinivasan A, Li F, Wu J (2008) A novel cds-based reputation monitoring system for wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS’08. IEEE, pp 364–369
20.
Zurück zum Zitat Momani M, Aboura K, Challa S (2007) Rbatmwsn: Recursive bayesian approach to trust management in wireless sensor networks. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, pp 347– 352 Momani M, Aboura K, Challa S (2007) Rbatmwsn: Recursive bayesian approach to trust management in wireless sensor networks. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, pp 347– 352
21.
Zurück zum Zitat Ozdemir S (2008) Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput Commun 31(17):3941–3953CrossRef Ozdemir S (2008) Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput Commun 31(17):3941–3953CrossRef
22.
Zurück zum Zitat Shaikh RA, Jameel H, Lee S, Rajput S, Song YJ (2006) Trust management problem in distributed wireless sensor networks. In: 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2006. Proceedings. IEEE, p 411–414 Shaikh RA, Jameel H, Lee S, Rajput S, Song YJ (2006) Trust management problem in distributed wireless sensor networks. In: 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2006. Proceedings. IEEE, p 411–414
23.
Zurück zum Zitat Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(11–12):2413–2427CrossRef Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(11–12):2413–2427CrossRef
24.
Zurück zum Zitat Li ZY, Liu L, Chen RL, Bi JL (2015) An adaptive secure communication framework for mobile peer-to-peer environments using bayesian games. Peer-to-Peer Networking and Applications:1–15 Li ZY, Liu L, Chen RL, Bi JL (2015) An adaptive secure communication framework for mobile peer-to-peer environments using bayesian games. Peer-to-Peer Networking and Applications:1–15
25.
Zurück zum Zitat Han Q, Wen H, Ma T, Wu B (2015) Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Networking and Applications:1–11 Han Q, Wen H, Ma T, Wu B (2015) Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Networking and Applications:1–11
26.
Zurück zum Zitat Wu X (2012) A distributed trust management model for mobile p2p networks. Peer-to-peer Netw Appl 5 (2):193–204CrossRefMathSciNet Wu X (2012) A distributed trust management model for mobile p2p networks. Peer-to-peer Netw Appl 5 (2):193–204CrossRefMathSciNet
27.
Zurück zum Zitat Welch G, Bishop G (2006) An introduction to the kalman filter. 2006. University of North Carolina: Chapel Hill, North Carolina, US Welch G, Bishop G (2006) An introduction to the kalman filter. 2006. University of North Carolina: Chapel Hill, North Carolina, US
28.
Zurück zum Zitat Fernández-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. IEEE, pp 25–30 Fernández-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. IEEE, pp 25–30
29.
Zurück zum Zitat Cheney J, Chiticariu L, Tan WC (2009) Provenance in databases: Why, how, and where. Found Trends Databases 1(4):379–474CrossRef Cheney J, Chiticariu L, Tan WC (2009) Provenance in databases: Why, how, and where. Found Trends Databases 1(4):379–474CrossRef
Metadaten
Titel
MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks
verfasst von
Gulustan Dogan
Koksal Avincan
Publikationsdatum
09.03.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2017
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0446-3

Weitere Artikel der Ausgabe 1/2017

Peer-to-Peer Networking and Applications 1/2017 Zur Ausgabe