BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS

Björn Stelte

Abstract

A secure Wireless Sensor Network consists of highly secured and trustworthy sensor nodes. But making one single node secure is impossible due to low computational power, memory and cost constraints. Sensor nodes are not tamper proof nor will be in future. In our concept we use low-cost redundant sensors and the Byzantine Fault Tolerance to overcome attacks on the network especially concerning insider attacks. Every sensor node calculates a trust-level of its peer neighbors by a Bayesian probabilistic reputation system. An efficient real-time based communication protocol is used to reduce communication overhead and to transport local trust-levels to the gateway node to calculate a common trust-level.

References

  1. Eugster, P. T., Felber, P. A., Guerraoui, R., and Kermarrec, A.-M. (2003). The many faces of publish/subscribe. ACM Comput. Surv., 35:114-131.
  2. Lamport, L., Shostak, R., and Pease, M. (1982). The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst., 4:382-401.
  3. Momani, M. and Challa, S. (2007). GTRSSN: Gaussian Trust and Reputation System for Sensor Networks. In SCSS (1), pages 343-347.
  4. Stelte, B. (2011). An Event Management System for Wireless Sensor Networks. In IEEE IM 2011 - TechSessions, Dublin, Ireland.
Download


Paper Citation


in Harvard Style

Stelte B. (2011). BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 396-399. DOI: 10.5220/0003524903960399


in Bibtex Style

@conference{secrypt11,
author={Björn Stelte},
title={BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={396-399},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003524903960399},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS
SN - 978-989-8425-71-3
AU - Stelte B.
PY - 2011
SP - 396
EP - 399
DO - 10.5220/0003524903960399