Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Similar documents
Trust and Reputation Systems for Wireless Sensor Networks

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks

Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective

Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

A TRUST-BY-DESIGN FRAMEWORK FOR THE INTERNET OF THINGS

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

A Survey of Trust Computation Models for Service Management in Internet of Things Systems

Adaptive Dispatching of Incidences based on Reputation for SCADA Systems

Trust-Based Intrusion Detection in Wireless Sensor Networks

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

arxiv: v1 [cs.cr] 30 May 2014

Adaptive Security in Cloud and Edge Networks

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Lecture 8 Wireless Sensor Networks: Overview

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

Data and Decision Analytics

WSN Routing Protocols

A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Trust in Ad hoc Networks A Novel Approach based on Clustering

A Survey on Secure Routing for Cooperative Heterogeneous Network

Prianka.P 1, Thenral 2

Trust is the Foundations for Computer Security

Wireless Sensor Networks

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing

Applicability of Public Key Infrastructures in Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl

Trusted Routing in IoT

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Semainaire Objects connectés industriels, M2M, réseaux June 12th, 2014 IoT et Smart Cities: comment passer à l échelle

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Sl.No Project Title Year

An Energy Efficient Intrusion Detection System in MANET.

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

Routing protocols in WSN

Securing IoT-based Cyber-Physical Human Systems against Collaborative Attacks

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

REFERENCING TOOL FOR REPUTATION AND TRUST IN WIRELESS SENSOR NETWORKS

SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS

Key Management Systems for Sensor Networks in the Context of the Internet of Things

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

Entropy-Based Recommendation Trust Model for Machine to Machine Communications

An Improved Chain-based Hierarchical Routing Protocol for Wireless Sensor Networks

ScienceDirect. Extending Lifetime of Wireless Sensor Networks by Management of Spare Nodes

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Development*Process*for*Secure* So2ware

Building the Storage Internet. Dispersed Storage Overview March 2008

Coordinator Location Effects in AODV Routing Protocol in ZigBee Mesh Network

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

Implementation of enhanced REAC-IN protocol

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Data Sources for Cyber Security Research

E-Commerce. Infrastructure I: Computer Networks

Problems in Reputation based Methods in P2P Networks

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Network Economics and Security Engineering

Automating the Top 20 CIS Critical Security Controls

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

Autoregression Models for Trust Management in Wireless Ad Hoc Networks

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

Study on Wireless Sensor Networks Challenges and Routing Protocols

Symantec Business Continuity Solutions for Operational Risk Management

QoS Trade-off Analysis for Wireless Sensor Networks

Synchronization in Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Countering Hidden-Action Attacks on Networked Systems

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

They avoid the cost, installation, and maintenance of network infrastructure.

Survivability Evaluation in Wireless Sensor Network

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Functional and Information Models for the MANNA Architecture 1

Mission Aware Cybersecurity

Void main Technologies

Query Evaluation in Wireless Sensor Networks

Digital Preservation: How to Plan

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

Time Synchronization in Wireless Sensor Networks: CCTS

Reliable Transmission Method With Energy-awareness for Wireless Sensor Networks

LEACH and PGASIS Protocols in wireless sensor network: Study and Simulation

Transcription:

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks)

Contents Wireless Sensor Networks (WSN) WSN and Trust Features for Trust Management Systems in WSN Conclusions

Wireless Sensor Networks (WSN)

WSN A Living being 1001001

WSN A Living being Base Station Sensor Nodes Cluster Flat Architecture Hierarchical Architecture

WSN Node Capabilities WEAK (Class I) NORMAL (Class II) HEAVY-DUTY (Class III) -4 Mhz -8 bit - 64B RAM -1.4kB ROM -1.5mA Energy -4~8 Mhz -8~16 bit -4~10 kbram - 48~128 kb ROM - ~2mA Energy - 13~180 Mhz - 32 bit - 256~512 kb RAM - 4~32 MB ROM - ~40mA Energy

WSN Security Wireless Sensor Networks need security! at least, a minimal set of security primitives and protocols to assure its functionality (Usability) Security Primitives (SKC, PKC), Key Management, Situation Awareness Trust. Security Primitives Key Management & Situation Awareness -------- Core Protocols PKI Trust & IDS

WSN and Trust Trust: The firm belief in the reliability or truth or strength of an entity.

Trust Management Systems Trust Management Term used to define a coherent framework for security policies, credentials and trust relationships They can be classified into: Credential-based Trust Management Systems Enable Access Control. Not interesting (here) Behaviour-based Trust Management Systems Based on the concept of Reputation. applicable to distributed systems, like WSN Reputation: What is generally said or believed about a person or the character or standing of a thing

Trust and WSN? Why Trust? Uncertainty = (Opportunism + Information Asymmetry) Opportunism: Transacting partners have different goals not true in WSN ( living being simile) Inf. Asymmetry: a partner does not have all the information it needs about others not true in WSN? (honest, collaborative nodes) Attacks + faulty nodes: generates Asymmetry Uncertainty Why Trust on WSN? Self-configurable networks: react and take autonomous decisions need to have mechanisms that help making choices Uncertainty: When the outcome of a certain situation cannot be clearly established or assured

State of the Art Existing approaches in Ad-Hoc/P2P Networks not suitable for distributed networks such as sensor networks. Device capabilities, scalability, lifetime, network behaviour. WSN-specific State of the Art: Trust Management through grouping (Zhang et. al., Crosby et. al.) Ad Hoc-like Trust Management, Trust per node (Yao et. al.) Certainty [self-assessment] (Chen et. al.) Calculation using bayesian formulation, BS role (Ganeriwal et. al.) Application-specific trust, Routing (Tanachaiwiwat et. al.)

Features for Trust Management Systems in WSN State of the Art is not wrong, but is not complete

Why Features of TMS? State of the Art is not bad however, it is incomplete Main purpose of this Features? Consider what have been neglected Initialization, Granularity Deliver a common architecture All the SotA can be mapped to it Review specific aspects of WSN Location, Behavioural patters Not mathematical results, just a foundation (Not going to provide the panacea but painkillers should be a good starting point)

Architecture and Components Base Station Sensor Node Trust Entity Trust Entity Situation Awareness 1st-Hand Information 2nd-Hand Information Reputation Manager T Trust Manager T Trust Entity Know the Situation, Model the information, Provide a metric

Architecture and Components Base Station Sensor Node Trust Entity Trust Entity 1st-Hand Information 2nd-Hand Information Reputation Manager T Trust Manager T Trust Entity Information Gathering Obtain information about behaviour, either through observation and experience or by sharing the observed events. Information Modelling Infer and store the reputation of the neighbourhood, obtain the trust values, provide decision support.

Architecture and Components Location of the Trust Entities Base Station Trust Entity Sensor Node Trust Entity Sensor Nodes Nodes are autonomous, need to measure their neighbours in order to achieve good coverage Base Station 1st-Hand Information 2nd-Hand Information Trust Entity Reputation Manager T Trust Manager T Bridge to all control and data packets. Take advantage of this wealth of information (powerful!)

Initialization & Information Gathering Initialization what are the initial trust and reputation values? Sensor nodes are born from the same cell they are programmed in a controlled environment Nothing malicious, HW tested Initial reputation should not affect negatively on the beginning No credentials? No admittance

Initialization & Information Gathering Information Gathering First-hand Monitoring the environment Packets Sensor Readings work to do (but already with a foundation stone)

Initialization & Information Gathering Information Gathering Second-hand Distribute reputation over nodes! Security problems, integration of honest reports Tools: Redundancy, Cryptographic techniques WSN-specific details Incoherencies = Existence of malicious entity Apoptosis 100% RH My Readings are wrong! Description: Section of mouse liver showing an apoptotic cell indicated by arrow

Information Modelling WSN specific behaviour There should be little deviation Updating the reputation values Nodes are not malicious by nature Aging: really bad reputation should not be forgotten Evolution: Memory of previous bad reputation Selective Forwarder

Information Modelling Input Events have different Influence (Unavailability Vs Selective Forwarding) Granularity Reputation = set of values Separate opinions about actions of peers Trust = set of values Decide outcome of specific interaction Reputation Manager Trust Manager Situation Awareness Sensing Routing Aggregating???

Information Modelling Calculating the Trust/Reputation values Weight and Combine according to Importance Risk Threshold ( trusted v not trusted) Also dependent of Importance / Risk Other ways: choosing the best partner (groups) To trust or not to trust To choose or not to choose

Conclusions

Conclusions Trust Management is needed by Wireless Sensor Networks Self-Configurability, Survivability, State of the Art is not wrong, but is not complete Take into account different factors, WSN-specific details The ultimate goal: Achieve a lightweight and useful Trust system it can be possible

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices