Documente Academic
Documente Profesional
Documente Cultură
AbstractUntil recently use of sensors to collect sensitive having communications, data exchanges or interactions within
parameters had only few risk factors such as sensor malfunction, a distributed environment. This article extends and presents the
uncertainty of data collection, or missing data coverage. Some outcome of study in security of WSN environment [21], and
issues in these categories were addressed by multi-sensor proposes improvements to the concept of Trust and Reputation
application or sensor fusion. However, advancement in Model. TRM in a general sense is combination of Bio-inspired
technology and advent of wireless sensors in a networked Trust and Reputation Model for Wireless Sensor Networks
environment, brought along a new risk factor related to the BTRM-WSN as well as Peer Trust system PTS. A review of
security in wireless sensor network. wireless sensor networks and importance of their security will
Therefore security in Wireless Sensor Network WSNs is be given here in this section. Description of Trust and
challenging and critical to the functionality of the networked Reputation Model will be presented and two security
sensors. This is very important in cases of highly secure approaches, that is, BTRM and PTS that led to the proposed
environment, especially in industrial, military, and medical model will be explored. Finally performance of the original
domains. The standard WSN protocols focus on energy approach and our proposed will be compared, leading to
efficiency; transmission efficiency, and routing. WSN is known
conclusion and planning for future research.
for limitations on hardware and software and for resources-
constrained in general. An adaptive model of security that meets A. Review of Wireless Sensor Networks
requirements and constraints in WSN is Intrusion Detections.
Wireless sensor networks consist of distributed autonomous
This article investigates security in WSN and presents a design
process for achieving optimum security based on requirements
sensors that are used for monitoring certain physical condition
and constraints in WSNs. Further, comparative results between a such as temperature, pressure, sound, motion, etc. The network
proposed technique and other security current approaches are system incorporates a gateway that provides wireless
discussed. connectivity to the distributed nodes and back to the wired
Keywords Security, wireless sensor network, trust and
network [20]. WSNs are designed to perform a variety of
reputation system, client sensors, server sensors, security level, path information processing functionalities including security and
length, energy efficiency. military sensing [11], environmental monitoring [12], as well
as healthcare supporting [13]. Applications of WSNs can vary
I. INTRODUCTION significantly in requirements and deployment environments.
Sensors have become a prevalent part of many aspects of WSNs can play a critical role in military Commands, Controls,
daily life and are greatly relied upon in technological Communications, Computing, Intelligence, Surveillances,
environments. The range of sensor usage varies from standard Reconnaissance, and Targeting (C4ISRT) systems [14]. They
to advanced levels. It is rarer to see the use of single senses to can be used to, for instance, monitor friendly and enemy
accomplish a task. Multisensors are more frequently forces, communicate commands, or sense different forms of
employed to enhance coverage and accuracy, and application attacks. Environmental applications have been proposed for
of sensor fusion has become increasingly ubiquitous [22], [23]. WSNs. Common uses of these applications are: habitat
The new technology facilitates sensor application in a monitoring, animal tracking, forest-fire detecting, precision
networked and wireless environment. While sensor fusion farming, and disaster relief. Embedding WSNs in natural
benefits significantly from wireless technology, it may suffer environment enables researchers to collect long-range data on
for security reasons. Not all applications benefit from a previously unattainable scales. WSN applications are
standard resourceful environment. In many cases, the most frequently employed in extreme environments, such as the
fundamental requirement of Wireless Sensor Networks WSNs Antarctic Pole. Several prototypes and commercial WSN
is security, under resource constraint operation. Various applications have been developed and applied for healthcare
approaches have been made to enhance network security, monitoring for the elderly, children and chronically ill people.
without heavily straining resources such as energy. In any One of the most popular categories include monitoring daily
networked environment, the security services of authentication activities for cases of fall, movement detection, location
and confidentiality are highly important factors in maintaining tracking, medical status monitoring, and meditation intake
communications. The Trust and Reputation Model (TRM) is an [13], [20]. The present work significantly improves the current
innovative security mechanism for wireless sensor networks. state of research [21] to accelerate optimal search and pareto
TRM ensures a minimum security level between two entities optimality for real-time applications.
(4)
could be calculated by Eq. 3.
Q(S ) = %A
( ) !"
(3) T(u) denotes the value of trustworthiness of peer u.
ij is the pheromone value of the path between sensor i and denotes the weight factor for the collective evaluation, a
sensor j; is the convergence value of ij; and is a parameter weighted average of amount of satisfaction that peer u receives;
controlling the amount of pheromone left by the ants. and denotes the weight factor for the community context
S denotes the solution brought back by ant k, it is factor. I(u) denotes the total number of transactions that peer u
has had with all other peers. S(u,i) denotes the normalized the
Q(S ) denotes the quality of path S ; denotes the average
represented the path leading to the sensor selected;
amount of satisfaction which peer u receives in its ith
path pheromone of path S found by and k; PLF[0,1] denotes transaction. Some existing reputation-based systems simply
a path length factor; and %A denote the percentage of ants apply a binary reputation mechanism to evaluate the degree of
that have selected the same solution as ant k. After computing satisfaction, where 0 represents unsatisfied, while 1 represent
the path quality of all solution brought back by ants, the client satisfied. However, this evaluating system may not function
selects the path with highest score and store it as Current_Best well [9], since malicious node may hide its misbehavior via
solution. Then the client compares the path quality with the increasing its transaction volume. Taking that into
consideration, a normalized satisfaction value is applied, where:
(1,2)6789:;
S(u, i) = , and S(u, i)<2=>? represent the binary
best solution (Global_Best) found by earlier transactions. If
0(1)
Current_Best solution is even better, then the client will
replace the previous Global_Best with the Current_Best satisfaction (0 or 1) peer u received in its ith transaction. Also,
solution. Then an extra ant is sent to modify the pheromone CR(p(u,i)) denotes the credibility of the feedback that peer u
value of the current Global_Best. receives from the ith peer (p(u,i)) it has transaction with. The
Having Transaction: After the client selects the reason why credibility of the feedback is important is that a
Global_Best solution, it will have transaction with the selected peer may make false statements for other peers. For instance, a
sensor. After receiving the service, the client will compare it malicious sensor may give low satisfaction for a benevolent
with the default service which the client expects to obtain. sensor, or give high satisfaction for a malicious sensor. As a
There are two possible scenarios: first, the selected server result, a credibility of feedback should be introduced; and
sensor might be completely benevolent and provide the exact feedback with higher credibility should be weighed more in
same service as it is supposed to; or it could be totally computing the trustworthiness of a give peer. Two mechanisms
malicious and provide extremely difference service. In the evaluating the credibility of feedback is introduced. Eq. 5.
former scenario, the client is satisfied and will give a illustrates the first mechanism, and the metric using this one to
satisfaction value (Sat) as a random number between PunTh measure credibility of feedback is called TTVM (where TVM
and 1; while in the latter scenario, the satisfaction value (Sat) stands for Trust Value Measurement). This mechanism uses the
is determined as a random number between 0 and PunTh as the trust value of peer p(u,i) to evaluate the trustworthiness of
client is considered as unsatisfied. PunTh is a predefined feedback received from it to peer u.
CR@p(u, i)A = D(E)
punishment threshold value. B(C(1,2))
7FG B(C(1,2))
(5)
Giving Reward or Punishment: A client will request the
desired service to what it things to be the most trustworthy Eq. 6. introduces a personalized similarity measurement