International Journal of Trust Management in Computing and Communications (5 papers in press)
A New Proposal for Trust Management in Wireless Sensor Networks based on Validation
by Albert Rego, Christos Gkountis, Laura García, Jaime Lloret
Abstract: Due to their many advantages, WSNs are getting more and more important in the field of monitoring and control systems. Despite their many advantages WSNs have some disadvantages that need to be solved. Trust-based networking can be applied to WSNs in order to get better their performance. In this paper, we proposed a new model for trust management between sensor nodes in a WSN based on false alarms they produced. The existence of validators in the WSN supports the node to determine if the alarm is a false positive. A communication model is proposed and its messages are described. Furthermore, we have performed several tests to validate the benefits of our proposal, measuring the energy consumed by the network and each individual node in the network in five scenarios. They showed us that not trusting all of the nodes in a WSN, can have better results in the total energy consumption of the network. However, having a high number of malicious nodes causes an increment of energy consumption in the rest of the nodes.
Keywords: validation; wireless sensor networks; alert detection system; fire detection; trust management; proposal; simulation.
An Efficient and Secure RSA based Certificateless Signature Scheme for Wireless Sensor Networks
by Vimal Kumar
Abstract: Wireless Sensor Networks (WSNs) consist of a large number of autonomous sensor nodes, spatially distributed to monitor environmental and physical conditions. As such networks use wireless environment for communication, they are highly vulnerable to different kinds of attacks viz., wormhole, blackhole, node capture, denial of service (DoS), physical tampering, and sybil attacks etc. Various security solutions based on public key infrastructure (PKI) have been proposed in past. However, certificateless signature scheme is more powerful than PKI as it eliminates a certificate authority or third party in WSN. Security algorithms based on bilinear pairing method take more computation cost for pairing operation. In this paper, we proposed an RSA-based certificateless signature scheme using service-oriented architecture (SOA). SOA is a type of middleware that supports application development and communication through various services deployed at every sensor node constituting the network. The security analysis of the proposed scheme has been checked in the random oracle model. Such oracle model is a way to prove the security, correctness of cryptography based algorithms, which use exponential operations and hash functions. The security of this scheme is closely related to discrete logarithm problem. Proposed scheme provides security against Type I & Type II attack and reducing computation cost in signature generation phase. It has additional features viz., authentication, integrity, non-repudiation, scalability, heterogeneity, flexibility, interoperability, and reusability.
Keywords: Wireless sensor network; RSA; Type I & Type II attack; Certificateless signature; SOA.
TRUST COMPUTATION IN VANET USING TOEFV
by Arpita Bhargava, Shekhar Verma, KAPIL SHARMA, Brijesh Kumar Chaurasia
Abstract: VANET aims to improve road safety by reducing and preventing traffic accidents. The network offers a broad diversity of applications and helps in safety related and infotainment related situations. The distinctive features of VANET, including high density with mobility and open shared wireless medium, may lead VANET suffering from many security vulnerabilities. In this paper, we propose a theory of evidence with the fuzzy analyzer in VANET (TOEFV) trust management scheme to increase the security of vehicles. In this work, Dempster Shafer theory is used to evaluate the probability of an event and fuzzy analyzer is utilized to evaluate the level of trust. Simulation results show that efficacy of the suggested system.
Keywords: VANET; Trust computation; Theory of evidence; DST; Fuzzy analyzer; VANETsim; Rewards and Penalty.
Intrusion Detection in a Trust-based Recommendation System
by Kameni Eric Desire, Th.P. (Theo) Van Der Weide
Abstract: In multi-agent systems agents cooperate by asking other agent's opinions as part of their own decision making process.
The goal of a recommendation system is to provide advice either on request or pro-actively.
In this paper we assume that the value of an advice from another agent is determined by the trust in that other agent.
We present a trust-based model of collaboration and decision making in a multi-agent system.
We assume however that agents may be dishonest (such an agent is called an intruder), resulting in advices that may be false.
The goal of this paper is the detection of intruders, thereby minimizing the damage that they can cause.
We also present the underlying relational database model and use this to build a prototype.
In our tests we show that the more influential an agent is in the multi-agent system, measured as its CreditRank, the faster that agent will be unmasked would it be an intruder.
Keywords: Multi-agent System; Trust; Recommendation System; CreditRank; Intrusion Detection.
Black Hole attack Detection and Ignoring in OLSR protocol
by Kamel SADDIKI, Sofiane BOUKLI-HACENE, Pascal LORENZ, Marc GILG
Abstract: Mobile ad hoc network (MANET) is a wireless network formed by the cooperation of arbitrary nodes moving randomly in arbitrary directions, the communication between nodes is established by using routing protocols. In the scenario of a dense network with a low-mobility, we use proactive routing protocols. The Optimised Link State Routing protocol is one of the most proactive routing protocols commonly used, despite the fact that OLSR has many advantages it still vulnerable to attacks such as the black hole. In this paper, we present a kind of black hole attack in which the malicious node announces a fake link with the three hop neighbours, this may lead to the selection of this node as an MPR. Then it can divert all traffic. We demonstrate the feasibility of this attack through a detailed simulation using NS2 Simulator. After that, we present a preferment scheme to detect and isolate malicious nodes.
Keywords: MANET; OLSR; Low-mobility; Black hole; NS2.