Trust Management for Resilient Wireless Sensor Networks

Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hur, Junbeom, Lee, Younho, Hong, Seong-Min, Yoon, Hyunsoo
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 68
container_issue
container_start_page 56
container_title
container_volume
creator Hur, Junbeom
Lee, Younho
Hong, Seong-Min
Yoon, Hyunsoo
description Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.
doi_str_mv 10.1007/11734727_7
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19689132</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19689132</sourcerecordid><originalsourceid>FETCH-LOGICAL-p218t-1cce142c5450d48cf6d67eea41e9eb08fa52e152f93f800fb6db6ae98594972a3</originalsourceid><addsrcrecordid>eNpFkEtLAzEUheMLbGs3_oLZCG5G781jkiyl-IKqoBXdhcz0poydzpRkRPz3tlRxdTh8H2dxGDtFuEAAfYmohdRcO73HhkJJEEIo9b7PBlgg5kJIe8DGVps_Js0hG4AAnlstxTEbpvQBAFxbPmB6Fj9Tnz341i9oRW2fhS5mz5Tqpt62tzpSQyllL9SmDXmk_quLy3TCjoJvEo1_c8Reb65nk7t8-nR7P7ma5muOps-xqgglr5RUMJemCsW80EReIlkqwQSvOKHiwYpgAEJZzMvCkzXKSqu5FyN2tttd-1T5JkTfVnVy61ivfPx2aAtjUfCNd77z0ga1C4qu7Lplcghu-5r7f038AOiaWa8</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trust Management for Resilient Wireless Sensor Networks</title><source>Springer Books</source><creator>Hur, Junbeom ; Lee, Younho ; Hong, Seong-Min ; Yoon, Hyunsoo</creator><contributor>Won, Dong Ho ; Kim, Seungjoo</contributor><creatorcontrib>Hur, Junbeom ; Lee, Younho ; Hong, Seong-Min ; Yoon, Hyunsoo ; Won, Dong Ho ; Kim, Seungjoo</creatorcontrib><description>Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540333548</identifier><identifier>ISBN: 3540333541</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 354033355X</identifier><identifier>EISBN: 9783540333555</identifier><identifier>DOI: 10.1007/11734727_7</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Malicious Node ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Neighbor Node ; Sensor Network ; Sensor Node ; Signal and communications theory ; Software ; Telecommunications and information theory ; Wireless Sensor Network</subject><ispartof>Information Security and Cryptology - ICISC 2005, 2006, p.56-68</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11734727_7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11734727_7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4035,4036,27904,38234,41421,42490</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19689132$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Won, Dong Ho</contributor><contributor>Kim, Seungjoo</contributor><creatorcontrib>Hur, Junbeom</creatorcontrib><creatorcontrib>Lee, Younho</creatorcontrib><creatorcontrib>Hong, Seong-Min</creatorcontrib><creatorcontrib>Yoon, Hyunsoo</creatorcontrib><title>Trust Management for Resilient Wireless Sensor Networks</title><title>Information Security and Cryptology - ICISC 2005</title><description>Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Malicious Node</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Neighbor Node</subject><subject>Sensor Network</subject><subject>Sensor Node</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540333548</isbn><isbn>3540333541</isbn><isbn>354033355X</isbn><isbn>9783540333555</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkEtLAzEUheMLbGs3_oLZCG5G781jkiyl-IKqoBXdhcz0poydzpRkRPz3tlRxdTh8H2dxGDtFuEAAfYmohdRcO73HhkJJEEIo9b7PBlgg5kJIe8DGVps_Js0hG4AAnlstxTEbpvQBAFxbPmB6Fj9Tnz341i9oRW2fhS5mz5Tqpt62tzpSQyllL9SmDXmk_quLy3TCjoJvEo1_c8Reb65nk7t8-nR7P7ma5muOps-xqgglr5RUMJemCsW80EReIlkqwQSvOKHiwYpgAEJZzMvCkzXKSqu5FyN2tttd-1T5JkTfVnVy61ivfPx2aAtjUfCNd77z0ga1C4qu7Lplcghu-5r7f038AOiaWa8</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Hur, Junbeom</creator><creator>Lee, Younho</creator><creator>Hong, Seong-Min</creator><creator>Yoon, Hyunsoo</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Trust Management for Resilient Wireless Sensor Networks</title><author>Hur, Junbeom ; Lee, Younho ; Hong, Seong-Min ; Yoon, Hyunsoo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p218t-1cce142c5450d48cf6d67eea41e9eb08fa52e152f93f800fb6db6ae98594972a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Malicious Node</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Neighbor Node</topic><topic>Sensor Network</topic><topic>Sensor Node</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hur, Junbeom</creatorcontrib><creatorcontrib>Lee, Younho</creatorcontrib><creatorcontrib>Hong, Seong-Min</creatorcontrib><creatorcontrib>Yoon, Hyunsoo</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hur, Junbeom</au><au>Lee, Younho</au><au>Hong, Seong-Min</au><au>Yoon, Hyunsoo</au><au>Won, Dong Ho</au><au>Kim, Seungjoo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trust Management for Resilient Wireless Sensor Networks</atitle><btitle>Information Security and Cryptology - ICISC 2005</btitle><date>2006</date><risdate>2006</risdate><spage>56</spage><epage>68</epage><pages>56-68</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540333548</isbn><isbn>3540333541</isbn><eisbn>354033355X</eisbn><eisbn>9783540333555</eisbn><abstract>Utilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11734727_7</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information Security and Cryptology - ICISC 2005, 2006, p.56-68
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19689132
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Cryptography
Exact sciences and technology
Information, signal and communications theory
Malicious Node
Memory and file management (including protection and security)
Memory organisation. Data processing
Neighbor Node
Sensor Network
Sensor Node
Signal and communications theory
Software
Telecommunications and information theory
Wireless Sensor Network
title Trust Management for Resilient Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T09%3A49%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trust%20Management%20for%20Resilient%20Wireless%20Sensor%20Networks&rft.btitle=Information%20Security%20and%20Cryptology%20-%20ICISC%202005&rft.au=Hur,%20Junbeom&rft.date=2006&rft.spage=56&rft.epage=68&rft.pages=56-68&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540333548&rft.isbn_list=3540333541&rft_id=info:doi/10.1007/11734727_7&rft_dat=%3Cpascalfrancis_sprin%3E19689132%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=354033355X&rft.eisbn_list=9783540333555&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true