LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
BY: TAUSEEF SHAH REG. NO. FA11-REE-049 SUPERVISOR DR. SAFDAR H. BOUK CO-SUPERVISOR DR. NADEEM JAVAID MVC: Modified VIKOR Model based Clustering Protocol.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
1 An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor Networks Chengfa Li, Mao Ye, Guihai Chen State Key Laboratory for Novel Software.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
Energy-Efficient Protocol for Cooperative Networks IEEE/ACM Transactions on Networking, Apr Mohamed Elhawary, Zygmunt J. Haas Yong Zhou
1 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Fenye Bao, Ing-Ray Chen,
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Improving Routing in Sensor Networks with Heterogeneous Sensor Nodes Xiaojiang Du & Fengjing Lin Vehicular Technology Conference,2005 Spring,Volume 4.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks Yun Wang,Kai Li, Jie Wu Southeast University, Nanjing, China, Temple.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks Min Qin and Roger Zimmermann Computer Science Department, Integrated Media Systems.
2003/04/24AARON LEE 1 An Efficient K-hop Clustering Routing Scheme for Ad-Hoc Wireless Networks S. F. Hwang, C. R. Dow Journal of the Internet Technology,
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
By Fernando Martincic, Loren Schwiebert.  Sensors periodically send data to BS.  Sensors send data to BS when threshold is exceeded. (reactive method)
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
Authors: N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Ching-Ju Lin Institute of Networking and Multimedia NTU
MCEEC: MULTI-HOP CENTRALIZED ENERGY EFFICIENT CLUSTERING ROUTING PROTOCOL FOR WSNS N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi.
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
Prolonging the Lifetime of Wireless Sensor Networks via Unequal Clustering Stanislava Soro Wendi B. Heinzelman University of Rochester IPDPS 2005.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
“LPCH and UDLPCH: Location-aware Routing Techniques in WSNs”. Y. Khan, N. Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah.
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Abstract 1/2 Wireless Sensor Networks (WSNs) having limited power resource report sensed data to the Base Station (BS) that requires high energy usage.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
1 Hierarchical Data Dissemination Scheme for Large Scale Sensor Networks Anand Visvanathan and Jitender Deogun Department of Computer Science and Engg,
1 Power-efficient Clustering Routing Protocol Based on Applications in Wireless Sensor Network Authors: Tao Liu and Feng Li Form:International Conferecnce.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks Author: Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Member, IEEE Computer.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Giannis F. Marias, Vassileios Tsetsos,
Networks and Communication Systems Department
Presentation transcript:

LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping Du

Outline 2 Motivation Clustered WSN Model Lightweight Scheme for Trust Decision-Making Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusion

Motivation 3 Limited work focus on – Resource efficiency of clustered WSNs fail to consider the problem of resource constraints of nodes used complex algorithms to calculate nodes’ trustworthiness – Dependability of the trust system itself Current: collect remote feedback and then aggregate s such feedback to yield the global reputation for the nodes Problem: How about open or hostile WSN environment contains a large number of undependable (or malicious) nodes?

Outline 4 Motivation Clustered WSN Model Lightweight Scheme for Trust Decision-Making Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusion

Clustered WSN Model 5 Nodes – CH: cluster head – CM: cluster member – BS: base station Communications – Inter-cluster: A CM can communicate with their CH directly. – Intra-cluster: A CH can forward the aggregated data to the central BS through other CHs.

Outline 6 Motivation Clustered WSN Model Lightweight Scheme for Trust Decision-Making Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusion

Trust Decision-Making at CM Level 7 Decision making: past interaction records? – Yes: CM-to-CM Direct trust degree (DTD) # of successful and unsuccessful interactions Interaction: cooperation of two CMs, e.g., node x sends a message to CH i via node y – Successful: node y forwarded such message to CH – Unsuccessful: » No retransmission of the packet within a threshold time » Overheard packet is illegally fabricated – No: CH-to-CM Indirect trust degree (ITD) send a feedback request to CH

CM-to-CM Direct Trust Calculation 8 a window of time # of successful interactions of node x with y # of unsuccessful interactions of node x with y strict punishment for unsuccessful interactions

CH-to-CM Feedback Trust Calculation 9 # of positive feedback # of negative feedback Assumption: CH is trustworthy within its cluster!

Trust Decision-Making at CH Level 10 Decision making: calculate for direct trust and feedback trust simultaneously CH-to-CH direct trust – # of successful and unsuccessful interactions BS-to-CH feedback trust – BS periodically asks all CHs for their trust ratings on their neighbors. – CH send a feedback request to BS

CH-to-CH Direct Trust Calculation 11 # of unsuccessful interactions of CH i with CH j strict punishment for unsuccessful interactions a window of time# of successful interactions of CH i with CH j

BS-to-CH Feedback Trust Calculation 12 feedback of CH k toward CH j # of positive feedback # of negative feedback quality of feedback

Self-Adaptive Global Trust Aggregation at CHs 13 # of successful interactions BS-to-CH feedback trust CH-to-CH Direct Trust # of positive feedbacks increasing α, Φ(x) quickly approaches 1

Outline 14 Motivation Clustered WSN Model Lightweight Scheme for Trust Decision-Making Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusion

Dependability Analysis Against Malicious Attacks

Communication Overhead Analysis and Comparison Assume: Network consists of m clusters (including the BS) average size of clusters is n (including the CH of the cluster) # of CM send n requests and receive n responses communicati on overhead of one node

Storage Overhead Analysis and Comparison

Outline 27 Motivation Clustered WSN Model Lightweight Scheme for Trust Decision-Making Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusion

LDTS Simulator and Environment

Overhead Evaluation and Comparison

Dependability Evaluation and Comparison

Outline 33 Motivation Clustered WSN Model Lightweight Scheme for Trust Decision-Making Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusion

Lightweight trust evaluating scheme – cooperations between CMs – cooperations between CHs Dependability-enhanced trust evaluating approach – cooperations between CHs Self-adaptive weighting method – CH’s trust aggregation