TY - GEN
T1 - Trust management for resilient wireless sensor networks
AU - Hur, Junbeom
AU - Lee, Younho
AU - Hong, Seong Min
AU - Yoon, Hyunsoo
PY - 2006
Y1 - 2006
N2 - Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.
AB - Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.
UR - http://www.scopus.com/inward/record.url?scp=33745820773&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33745820773&partnerID=8YFLogxK
U2 - 10.1007/11734727_7
DO - 10.1007/11734727_7
M3 - Conference contribution
AN - SCOPUS:33745820773
SN - 3540333541
SN - 9783540333548
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 56
EP - 68
BT - Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers
PB - Springer Verlag
T2 - 8th International Conference on Information Security and Cryptology, ICISC 2005
Y2 - 1 December 2005 through 2 December 2005
ER -