• DocumentCode
    2595663
  • Title

    Distributed Reputation System for Tracking Applications in Sensor Networks

  • Author

    Roosta, Tanya ; Meingast, Marci ; Sastry, Shankar

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., California Univ., Berkeley, CA
  • fYear
    2006
  • fDate
    17-21 July 2006
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Ad-hoc sensor networks are becoming more common, yet security of these networks is still an issue, node misbehavior due to malicious attacks can impair the overall functioning of the system. Existing approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches only address part of the problem of security in sensor networks. However, cryptography is not sufficient to prevent the attacks in which some of the nodes are overtaken and compromised by a malicious user. Recently, the use of reputation systems has shown positive results as a self-policing mechanism in ad-hoc networks. This scheme can aid in decreasing vulnerabilities which are not solved by cryptography, We look at how a distributed reputation scheme can benefit the object tracking application in sensor networks. Tracking multiple objects is one of the most important applications of the sensor network. In our setup, nodes detect misbehavior locally from observations, and assign a reputation to each of their neighbors. These reputations are used to weight node readings appropriately when performing object tracking. Over time, data from malicious nodes will not be included in the track formation process. We evaluate the reputation system experimentally and demonstrate how it improves object tracking in the presence of malicious nodes
  • Keywords
    ad hoc networks; cryptography; message authentication; telecommunication security; wireless sensor networks; ad-hoc sensor networks; cryptography; data authentication; distributed reputation scheme; node misbehavior; object tracking application; reputation systems; self-policing mechanism; track formation process; Ad hoc networks; Communication system security; Cryptography; Data security; Information security; Internet; Monitoring; Sensor systems and applications; Sociology; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile and Ubiquitous Systems - Workshops, 2006. 3rd Annual International Conference on
  • Conference_Location
    San Jose, CA
  • Print_ISBN
    0-7803-9791-6
  • Electronic_ISBN
    0-7803-9792-4
  • Type

    conf

  • DOI
    10.1109/MOBIQW.2006.361781
  • Filename
    4205306