Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Anonymity Trust Management Scheme (ATMS) for Clustered Wireless Sensor Networks


Affiliations
1 Department of Computer Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India
2 Indian Institute of Science, Bangalore, India
     

   Subscribe/Renew Journal


Wireless Sensor Networks consists of sensor nodes that are capable of sensing information in the area of interest and maintaining security is a very important issue. The existing Trust Management Scheme is prone to security issues and adversaries can determine the trust values by adapting traffic analysis attack. In this paper, we have proposed an Anonymity Trust Management Scheme (ATMS) to enhance the security level in WSNs. Our approach provides a secure and stable path for communication which overcomes the effects of node compromise. It is observed that the performance of the network is better than existing schemes through simulation.

Keywords

Anonymity, Cluster Head, Peer Recommendation, Subrange Values, Trust Value, Wireless Sensor Networks
Subscription Login to verify subscription
User
Notifications
Font Size


  • Saurabh Ganeriwal, Laura K Balzano and Mani B Srivastava, “Reputationbased Framework for High Integrity Sensor Network,” ACM Transaction on Sensor Networks, vol. 4, no. 3, pp. 15:1–37, 2008.
  • G. V. Crosby, N. Pissinou and James Gadze, “A Framework of Trustbased Cluster Head Election in Wireless Sensor Networks,” in Proceedings of the 2nd IEEE workshop on Dependibility and Security in Sensor Networks and Systems, Columbia, 2006, pp. 10–22.
  • Niki Pissinou and Garth V Crosby, “Cluster-based Reputation and Trust for Wireless Sensor Networks,” in Proceedings of the Fourth IEEE Conference on Consumer Communications and Networking (CCNC ’07), Las Vegas, Nivada, 2007, pp. 604–608.
  • M. Momani, S. Challa and R. Alhmouz, “Can we Trust Trusted Nodes in Wireless Sensor Networks?” in Proceedings of The International Conference on Computer and Communication Engineering (ICCCE ’08), Kuala Lumpur, Malaysia, 2008, pp. 1227–1232.
  • Y. Sun, Z. Han, W. Yu and K. Liu, “A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks,” in Proceedings of IEEE INFOCOM, 2006, pp. 1–13.
  • Boukerche, X. Li and K. EL-Khatib, “Trust based Security for Wireless Adhoc and Sensor Networks,” in Computer Communications, vol. 30, no. 11-12, pp. 2413–2427, September 2007.
  • Efthimia Aivaloglou, Stefanos Gritzalis and Charalabos Skianis, “Trust Establishment in Sensor Networks:Behaviour-Based, Certificate-Based and a Combinational Approach,” in International Journal System of Systems Engineering, vol. 1, no. 1/2, pp. 128–148, 2008.
  • M. Krasniewski, P. Varadharajan, B. Rabeler and S. Bagchi, “TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks,” in Proceedings of The 2005 International Conference on Dependable Systems and Networks, Yokohama, Japan, 2005, pp. 672–681.
  • Ming Yu and Kin K Lueng, “A Trustworthiness-Based QoS Routing Protocol for Wireless Ad Hoc Networks,” in IEEE Transaction on Wireless Communication, vol. 8, no. 4, pp. 1888–1898, April 2009.
  • Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Saeed Rajput and Young-Jae Song, “Trust Management Problem in Distributed Wireless Sensor Networks,” in Proceedings of the 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’06), 2006, pp. 411–414.
  • Riaz Ahmed Shaikh, Hassan Jameel, Brian J. dAuriol, Heejo Lee, Sungyoung Lee and Young-Jae Song, “Group-based Trust Management Scheme for Clustered Wireless Sensor Network,” in IEEE Transaction on Parallel And Distributed Systems, vol. 20, no. 11, pp. 1698–1712, 2009.
  • S. Karthik, K. Vanitha and G Radhamani, “Trust Management Techniques in Wireless Sensor Networks: An Evaluation,” in Proceedings of IEEE Conference on Communications and Signal Processing,(ICCSP), 2011, pp. 328–330.
  • Basel Alomair, Andrew Clark, Jorge Cuellar and Radha Poovendran, “Statistical Framework for Source Anonymity in Sensor Networks,” in Proceedings of the IEEE Conference on Global Telecommunications (GLOBECOM 2010), 2010, pp. 1–6.
  • Ali Abbasi, Ahmad Khonsari and Mohammad S Talebi, “Secure Location Anonymity for Sensor Networks,” in Proceedings of Sixth IEEE Conference on Consumer Communications and Networking (CCNC’09), 2009, pp. 588–592.
  • Satyajayant Misra and Guoliang Xue, “SAS:A Simple Anonymity Scheme for Clustered Wireless Sensor Networks,” in Proceedings of IEEE ICC 2006, 2006, pp. 3414–3419.
  • S. Misra and G. Xue, “Efficient Anonymity Schemes for Clustered Wireless Sensor Networks,” International Journal of Sensor Networks, vol. 1, no. 1/2, pp. 50–63, 2006.
  • Haiguang Chen, Huafeng Wu, Jinchu Hu and Chuashan Gao, “Event based Trust Framework Model in Wireless Sensor Networks,” in Proceedings of IEEE International Conference on Networking, Architecture and Storage, 2008, pp. 359–364.
  • Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma and Qingquan Peng, “Distributed Event-Triggered Trust Management for Wireless Sensor Networks,” in Proceedings of 2009 Fifth International Conference on Information Assurance and Security, 2009, pp. 291–294.
  • Junqi Zhang, Rajan Shankaran, Mehmet A Orgun, Vijay Varadharajan and Abdul Sattar, “A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks,” in Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010, pp. 484–491.
  • J. Zhang, Rajan Shankaran, Mehmet A Orgun, Vijay Varadharajan and Abdul Sattar, “A Trust Management Architecture for Hierarchical Wireless Sensor Networks,” in Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010, pp. 264–267.
  • Jun-Won Ho, “Zone Based Trust Management in Sensor Networks,” in Proceedings of IEEE International Conference on Pervasive Computing and Communications, 2009, pp. 1–2.
  • Ben Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang and De-Yu Wang, “Markov Chain based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks,” in Proceedings of the 2008 IEEE Conference on Asia-Pacific Services Computing, 2008, pp. 156–161.
  • Azzedine Boukerche, Yonglin Ren and Zhenxia Zhang, “Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad Hoc Networks,” in Proceedings of 32nd IEEE Conference on Local Computer Networks, 2007, pp. 893–900.
  • Zhiying Yao, Daeyoung Kim and Yoonmee Doh, “PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security,” in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systemsv(MASS), 2006, pp. 437–446.
  • Yi Ouyang, Zhengyi Le, Yurong Xu and Nikos Triandopoulos, “Providing Anonymity in Wireless Sensor Networks,” in Proceedings of IEEE International Conference on Pervasive Services, 2007, pp. 145–148.
  • A Wadaa, S Olariu, L Wilson, M Eltoweissy and K Jones, “On Providing Anonymity in Wireless Sensor Networks,” in Proceedings of the Tenth International Conference on Parallel and Distributed Systems(ICPADS’04), 2004, pp. 411–418.
  • Yihua Zhang, Matthew Price, Lukasz Opyrchal and Keith Frikken, “All Proxy Scheme for Event Source Anonymity in Wireless Sensor Networks,” in Proceedings of Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2010, pp. 263–268.
  • Zhong Ren and Mohamed Younis, “Effect of Mobility and Count of Base Stations on the Anonymity of Wireless Sensor Networks,” in Proceedings of IEEE, 2011, pp. 436–441.
  • Qijun Gu, Xiao Chen, Zhen Jiang and Jie Wu, “Sink-Anonymity Mobility Control in Wireless Sensor Networks,” in Proceedings of IEEE International Conference on Wireless Computing, Networking and Communications, 2009, pp. 36–41.
  • Yousef Ebrahimi and Mohamed Younis, “Increasing Transmission Power for Higher Base-Station Anonymity in Wireless Sensor Networks,” in Proceedings of IEEE International Conference on Communications(ICC), Kyoto, 2011, pp. 1–5.
  • Y. Ebrahimi and Mohamed Younis, “Using Deceptive Packets to Increase Base-Station Anonymity in Wireless Sensor Networks,” in Proceedings of Seventh International Conference on Wireless Communications and Mobile Computing (IWCMC), 2011, pp. 842–847.

Abstract Views: 357

PDF Views: 0




  • Anonymity Trust Management Scheme (ATMS) for Clustered Wireless Sensor Networks

Abstract Views: 357  |  PDF Views: 0

Authors

K Shaila
Department of Computer Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India
S H Manjula
Department of Computer Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India
K R Venugopal
Department of Computer Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India
L M Patnaik
Indian Institute of Science, Bangalore, India

Abstract


Wireless Sensor Networks consists of sensor nodes that are capable of sensing information in the area of interest and maintaining security is a very important issue. The existing Trust Management Scheme is prone to security issues and adversaries can determine the trust values by adapting traffic analysis attack. In this paper, we have proposed an Anonymity Trust Management Scheme (ATMS) to enhance the security level in WSNs. Our approach provides a secure and stable path for communication which overcomes the effects of node compromise. It is observed that the performance of the network is better than existing schemes through simulation.

Keywords


Anonymity, Cluster Head, Peer Recommendation, Subrange Values, Trust Value, Wireless Sensor Networks

References