Trust management for resilient wireless sensor networks

Junbeom Hur, Younho Lee, Seong Min Hong, Hyunsoo Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Citations (Scopus)

Abstract

Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.

Original languageEnglish
Title of host publicationInformation Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers
PublisherSpringer Verlag
Pages56-68
Number of pages13
ISBN (Print)3540333541, 9783540333548
DOIs
Publication statusPublished - 2006 Jan 1
Externally publishedYes
Event8th International Conference on Information Security and Cryptology, ICISC 2005 - Seoul, Korea, Republic of
Duration: 2005 Dec 12005 Dec 2

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3935 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other8th International Conference on Information Security and Cryptology, ICISC 2005
CountryKorea, Republic of
CitySeoul
Period05/12/105/12/2

Fingerprint

Trust Management
Sensor networks
Sensor Networks
Wireless Sensor Networks
Wireless sensor networks
Real Roots
Trustworthiness
Key Management
Military applications
Security Policy
Energy resources
Sensor nodes
Battery
Authentication
Military
Industrial applications
Privacy
Attack
Sensor
Resources

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Hur, J., Lee, Y., Hong, S. M., & Yoon, H. (2006). Trust management for resilient wireless sensor networks. In Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers (pp. 56-68). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3935 LNCS). Springer Verlag. https://doi.org/10.1007/11734727_7

Trust management for resilient wireless sensor networks. / Hur, Junbeom; Lee, Younho; Hong, Seong Min; Yoon, Hyunsoo.

Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, 2006. p. 56-68 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hur, J, Lee, Y, Hong, SM & Yoon, H 2006, Trust management for resilient wireless sensor networks. in Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3935 LNCS, Springer Verlag, pp. 56-68, 8th International Conference on Information Security and Cryptology, ICISC 2005, Seoul, Korea, Republic of, 05/12/1. https://doi.org/10.1007/11734727_7
Hur J, Lee Y, Hong SM, Yoon H. Trust management for resilient wireless sensor networks. In Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag. 2006. p. 56-68. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11734727_7
Hur, Junbeom ; Lee, Younho ; Hong, Seong Min ; Yoon, Hyunsoo. / Trust management for resilient wireless sensor networks. Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, 2006. pp. 56-68 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{b6cc72e5dc3040cbab8ecd0606caaf64,
title = "Trust management for resilient wireless sensor networks",
abstract = "Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.",
author = "Junbeom Hur and Younho Lee and Hong, {Seong Min} and Hyunsoo Yoon",
year = "2006",
month = "1",
day = "1",
doi = "10.1007/11734727_7",
language = "English",
isbn = "3540333541",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "56--68",
booktitle = "Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers",

}

TY - GEN

T1 - Trust management for resilient wireless sensor networks

AU - Hur, Junbeom

AU - Lee, Younho

AU - Hong, Seong Min

AU - Yoon, Hyunsoo

PY - 2006/1/1

Y1 - 2006/1/1

N2 - Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.

AB - Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.

UR - http://www.scopus.com/inward/record.url?scp=33745820773&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745820773&partnerID=8YFLogxK

U2 - 10.1007/11734727_7

DO - 10.1007/11734727_7

M3 - Conference contribution

AN - SCOPUS:33745820773

SN - 3540333541

SN - 9783540333548

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 56

EP - 68

BT - Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers

PB - Springer Verlag

ER -