Trust Management for Resilient Wireless Sensor Networks
Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their i...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 68 |
---|---|
container_issue | |
container_start_page | 56 |
container_title | |
container_volume | |
creator | Hur, Junbeom Lee, Younho Hong, Seong-Min Yoon, Hyunsoo |
description | Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches. |
doi_str_mv | 10.1007/11734727_7 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19689132</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19689132</sourcerecordid><originalsourceid>FETCH-LOGICAL-p218t-1cce142c5450d48cf6d67eea41e9eb08fa52e152f93f800fb6db6ae98594972a3</originalsourceid><addsrcrecordid>eNpFkEtLAzEUheMLbGs3_oLZCG5G781jkiyl-IKqoBXdhcz0poydzpRkRPz3tlRxdTh8H2dxGDtFuEAAfYmohdRcO73HhkJJEEIo9b7PBlgg5kJIe8DGVps_Js0hG4AAnlstxTEbpvQBAFxbPmB6Fj9Tnz341i9oRW2fhS5mz5Tqpt62tzpSQyllL9SmDXmk_quLy3TCjoJvEo1_c8Reb65nk7t8-nR7P7ma5muOps-xqgglr5RUMJemCsW80EReIlkqwQSvOKHiwYpgAEJZzMvCkzXKSqu5FyN2tttd-1T5JkTfVnVy61ivfPx2aAtjUfCNd77z0ga1C4qu7Lplcghu-5r7f038AOiaWa8</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trust Management for Resilient Wireless Sensor Networks</title><source>Springer Books</source><creator>Hur, Junbeom ; Lee, Younho ; Hong, Seong-Min ; Yoon, Hyunsoo</creator><contributor>Won, Dong Ho ; Kim, Seungjoo</contributor><creatorcontrib>Hur, Junbeom ; Lee, Younho ; Hong, Seong-Min ; Yoon, Hyunsoo ; Won, Dong Ho ; Kim, Seungjoo</creatorcontrib><description>Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540333548</identifier><identifier>ISBN: 3540333541</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 354033355X</identifier><identifier>EISBN: 9783540333555</identifier><identifier>DOI: 10.1007/11734727_7</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Malicious Node ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Neighbor Node ; Sensor Network ; Sensor Node ; Signal and communications theory ; Software ; Telecommunications and information theory ; Wireless Sensor Network</subject><ispartof>Information Security and Cryptology - ICISC 2005, 2006, p.56-68</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11734727_7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11734727_7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4035,4036,27904,38234,41421,42490</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19689132$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Won, Dong Ho</contributor><contributor>Kim, Seungjoo</contributor><creatorcontrib>Hur, Junbeom</creatorcontrib><creatorcontrib>Lee, Younho</creatorcontrib><creatorcontrib>Hong, Seong-Min</creatorcontrib><creatorcontrib>Yoon, Hyunsoo</creatorcontrib><title>Trust Management for Resilient Wireless Sensor Networks</title><title>Information Security and Cryptology - ICISC 2005</title><description>Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Malicious Node</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Neighbor Node</subject><subject>Sensor Network</subject><subject>Sensor Node</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540333548</isbn><isbn>3540333541</isbn><isbn>354033355X</isbn><isbn>9783540333555</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkEtLAzEUheMLbGs3_oLZCG5G781jkiyl-IKqoBXdhcz0poydzpRkRPz3tlRxdTh8H2dxGDtFuEAAfYmohdRcO73HhkJJEEIo9b7PBlgg5kJIe8DGVps_Js0hG4AAnlstxTEbpvQBAFxbPmB6Fj9Tnz341i9oRW2fhS5mz5Tqpt62tzpSQyllL9SmDXmk_quLy3TCjoJvEo1_c8Reb65nk7t8-nR7P7ma5muOps-xqgglr5RUMJemCsW80EReIlkqwQSvOKHiwYpgAEJZzMvCkzXKSqu5FyN2tttd-1T5JkTfVnVy61ivfPx2aAtjUfCNd77z0ga1C4qu7Lplcghu-5r7f038AOiaWa8</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Hur, Junbeom</creator><creator>Lee, Younho</creator><creator>Hong, Seong-Min</creator><creator>Yoon, Hyunsoo</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Trust Management for Resilient Wireless Sensor Networks</title><author>Hur, Junbeom ; Lee, Younho ; Hong, Seong-Min ; Yoon, Hyunsoo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p218t-1cce142c5450d48cf6d67eea41e9eb08fa52e152f93f800fb6db6ae98594972a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Malicious Node</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Neighbor Node</topic><topic>Sensor Network</topic><topic>Sensor Node</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hur, Junbeom</creatorcontrib><creatorcontrib>Lee, Younho</creatorcontrib><creatorcontrib>Hong, Seong-Min</creatorcontrib><creatorcontrib>Yoon, Hyunsoo</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hur, Junbeom</au><au>Lee, Younho</au><au>Hong, Seong-Min</au><au>Yoon, Hyunsoo</au><au>Won, Dong Ho</au><au>Kim, Seungjoo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trust Management for Resilient Wireless Sensor Networks</atitle><btitle>Information Security and Cryptology - ICISC 2005</btitle><date>2006</date><risdate>2006</risdate><spage>56</spage><epage>68</epage><pages>56-68</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540333548</isbn><isbn>3540333541</isbn><eisbn>354033355X</eisbn><eisbn>9783540333555</eisbn><abstract>Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11734727_7</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information Security and Cryptology - ICISC 2005, 2006, p.56-68 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19689132 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Cryptography Exact sciences and technology Information, signal and communications theory Malicious Node Memory and file management (including protection and security) Memory organisation. Data processing Neighbor Node Sensor Network Sensor Node Signal and communications theory Software Telecommunications and information theory Wireless Sensor Network |
title | Trust Management for Resilient Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T09%3A49%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trust%20Management%20for%20Resilient%20Wireless%20Sensor%20Networks&rft.btitle=Information%20Security%20and%20Cryptology%20-%20ICISC%202005&rft.au=Hur,%20Junbeom&rft.date=2006&rft.spage=56&rft.epage=68&rft.pages=56-68&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540333548&rft.isbn_list=3540333541&rft_id=info:doi/10.1007/11734727_7&rft_dat=%3Cpascalfrancis_sprin%3E19689132%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=354033355X&rft.eisbn_list=9783540333555&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |