Sciweavers

Share
IJNSEC
2011

Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks

8 years 7 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks we introduce a location-aware, trust-based protocol that detects and isolates compromised nodes. We employ a secure cluster formation algorithm to facilitate the establishment of trusted clusters via pre-distributed keys. Reputation and trust is built over time through the monitoring of neighboring nodes. Our scheme provides a mechanism for developing reputation and trust so that a device can determine whether other devices have been compromised, and take corrective action, through negative information sharing and independent trust-based decision making. We also present a simple location verification algorithm that utilizes the received signal strength information in the proc...
Garth V. Crosby, Lance Hester, Niki Pissinou
Added 14 May 2011
Updated 14 May 2011
Type Journal
Year 2011
Where IJNSEC
Authors Garth V. Crosby, Lance Hester, Niki Pissinou
Comments (0)
books