Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks Article

Crosby, GV, Hester, L, Pissinou, N. (2011). Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks . 12(2), 107-117.

cited authors

  • Crosby, GV; Hester, L; Pissinou, N

fiu authors

abstract

  • The detection and isolation of compromised nodes in wire-less sensor networks is a diffcult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks we introduce a location-aware, trust-based protocol that detects and isolates compromised nodes. We employ a secure cluster formation algorithm to facilitate the establishment of trusted clusters via pre-distributed keys. Reputation and trust is built over time through the monitoring of neighboring nodes. Our scheme provides a mechanism for developing reputation and trust so that a device can determine whether other devices have been compromised, and take corrective action, through negative information sharing and independent trust-based decision making. We also present a simple location verification algorithm that utilizes the received signal strength information in the process of verifying reported location information. The effectiveness of our approach in the detection and isolation of compromise nodes is validated through simulation. The results indicate that our scheme provides an effective mechanism for detecting and isolating compromised colluding nodes.

publication date

  • March 1, 2011

start page

  • 107

end page

  • 117

volume

  • 12

issue

  • 2