By Topic

A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Poolsappasit, N. ; Dept. of Comput. Sci., Missouri Univ. of Sci. & Technol., Rolla, MO, USA ; Madria, S.K.

Efficient power management is vital for increasing the life of wireless sensor networks (WSN). The main reason is that the radio transmission consumes energy approximately three times comparing to other operations. Thus, techniques such as data aggregation have been widely used in WSN to preserve energy. Despite its appealing and powerful features, data aggregation requires a high level of security as tampering with aggregating data can be suspected due to small bit errors. We propose a comprehensive trust management approach to deal with the potential dishonest and faulty motes in sensor networks. Unlike other trust management approaches, we take into account multiple properties in leveraging between positive trust and behavior uncertainty so as to yield the projection of trust which represents truster's confidence in the trustee node to have the capability to complete the task. We comprehensively evaluate and compare trust management schemes in the sensing environment using TOSSim simulator. The results have shown that the proposed scheme is memory efficient and provides fairly accurate results allowing sensors to appropriately adjust themselves and manage to carry out their missions during normal and extreme environment.

Published in:

Parallel Processing (ICPP), 2011 International Conference on

Date of Conference:

13-16 Sept. 2011