Can we trust trusted nodes in wireless sensor networks?

Mohammad Momani*, Subhash Challa, Rami Alhmouz

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Abstract

In this paper we extend our previously designed trust model in wireless sensor networks to include both; communication trust and data trust. Trust management in wireless sensor networks is predominantly based on routing messages; whether the communication has happened or not (successful and unsuccessful transactions). The uniqueness of sensing data in wireless sensor networks introduces new challenges in calculating trust between nodes (data trust). If the overall trust is based on just the communication trust, it might mislead the network, that is; untrustworthy nodes in terms of sensed data can be classified as trusted nodes due to their communication capabilities. Hence we need to develop new trust models to address the issue of the actual sensed data. Here we are comparing the two trust models and proving that one model by itself is not enough to decide on the trustworthiness of a node, so new techniques are required to combine both data trust and communication trust.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Computer and Communication Engineering 2008, ICCCE08
Subtitle of host publicationGlobal Links for Human Development
Pages1227-1232
Number of pages6
DOIs
Publication statusPublished - 2008
EventInternational Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development - Kuala Lumpur, Malaysia
Duration: May 13 2008May 15 2008

Publication series

NameProceedings of the International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development

Other

OtherInternational Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development
Country/TerritoryMalaysia
CityKuala Lumpur
Period5/13/085/15/08

ASJC Scopus subject areas

  • Computer Science Applications
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'Can we trust trusted nodes in wireless sensor networks?'. Together they form a unique fingerprint.

Cite this