Title: PLUS: parameterised localised trust management-based security framework for sensor networks

Authors: Zhiying Yao, Daeyoung Kim, Yoonmee Doh

Addresses: Real-time and Embedded Systems Laboratory, Information and Communications University, Korea. ' Real-time and Embedded Systems Laboratory, Information and Communications University, Korea. ' Telematics USN Division, Electronics Telecommunications Research Institute, Korea

Abstract: Ubiquitous computing, regarded as the calm technology, opens up various novel applications. It relies on the use of tiny devices embedded in everyday objects and environments, intelligently collecting and delivering information and communicating without any fixed infrastructure. Sensor networks as a sufficient enabling technology can be used as room temperatures controller, as real-time traffic monitor and can provide security in office buildings, military surveillance, etc. However, the wireless and resource-constraint nature of a sensor network makes it an ideal medium for attackers to do any kind of vicious things. In this paper, we propose a Parameterised and Localised trUst management Security (PLUS) framework that incorporates well-managed parameters and localised trust model to achieve security for wireless sensor networks. In the framework, each sensor node maintains highly abstracted parameters, rates the trustworthiness of its interested neighbours to adopt appropriate cryptographic methods, identify the malicious nodes and share the estimation locally. And also, as an application of the framework, a secure routing protocol, called PLUS_R, was designed. Results of a series of simulation experiments show that with PLUS, network can maximise security as well as minimise energy consumption. Additionally, PLUS_R shows its benefit and feasibility with security-aware route and a reasonable communication overhead.

Keywords: wireless sensor networks; WSNs; security architecture; trust management; simulation; wireless networks; ubiquitous computing; network security; trustworthiness; cryptography; malicious nodes; secure routing protocols; simulation; energy consumption.

DOI: 10.1504/IJSNET.2008.019005

International Journal of Sensor Networks, 2008 Vol.3 No.4, pp.224 - 236

Available online: 27 Jun 2008 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article