TY - GEN
T1 - Can we trust trusted nodes in wireless sensor networks?
AU - Momani, Mohammad
AU - Challa, Subhash
AU - Alhmouz, Rami
PY - 2008
Y1 - 2008
N2 - In this paper we extend our previously designed trust model in wireless sensor networks to include both; communication trust and data trust. Trust management in wireless sensor networks is predominantly based on routing messages; whether the communication has happened or not (successful and unsuccessful transactions). The uniqueness of sensing data in wireless sensor networks introduces new challenges in calculating trust between nodes (data trust). If the overall trust is based on just the communication trust, it might mislead the network, that is; untrustworthy nodes in terms of sensed data can be classified as trusted nodes due to their communication capabilities. Hence we need to develop new trust models to address the issue of the actual sensed data. Here we are comparing the two trust models and proving that one model by itself is not enough to decide on the trustworthiness of a node, so new techniques are required to combine both data trust and communication trust.
AB - In this paper we extend our previously designed trust model in wireless sensor networks to include both; communication trust and data trust. Trust management in wireless sensor networks is predominantly based on routing messages; whether the communication has happened or not (successful and unsuccessful transactions). The uniqueness of sensing data in wireless sensor networks introduces new challenges in calculating trust between nodes (data trust). If the overall trust is based on just the communication trust, it might mislead the network, that is; untrustworthy nodes in terms of sensed data can be classified as trusted nodes due to their communication capabilities. Hence we need to develop new trust models to address the issue of the actual sensed data. Here we are comparing the two trust models and proving that one model by itself is not enough to decide on the trustworthiness of a node, so new techniques are required to combine both data trust and communication trust.
UR - http://www.scopus.com/inward/record.url?scp=51849099018&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51849099018&partnerID=8YFLogxK
U2 - 10.1109/ICCCE.2008.4580801
DO - 10.1109/ICCCE.2008.4580801
M3 - Conference contribution
AN - SCOPUS:51849099018
SN - 9781424416929
T3 - Proceedings of the International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development
SP - 1227
EP - 1232
BT - Proceedings of the International Conference on Computer and Communication Engineering 2008, ICCCE08
T2 - International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development
Y2 - 13 May 2008 through 15 May 2008
ER -