5,456 research outputs found

    Trustworthiness assessment of cow behaviour data collected in a wireless sensor network

    Get PDF
    Wireless sensor networks can be used for automated cow monitoring, e.g. for behaviour and locomotion monitoring. Sensor data should only be used when they can be trusted. The trustworthiness of sensor data can be assessed in a framework, from the acquisition at the node to their delivery to business applications, including any intermediary routing and processing. The trustworthiness assessment method has been evaluated with sensor data collected during one of the experiments within the WASP project. Sensor data are not trusted when the trustworthiness gets below a threshold. An alert is generated then and it is possible to find the cause by tracing back the trust of composing elements. The trustworthiness assessment method results in the detection of problems with nodes (e.g. detached node or exhausted battery). Most of these problems can be classified as true and most of them were not notified on the farm. Therefore trustworthiness assessment is worthwhile to improve automated cow status monitoring

    Can we trust trusted nodes in wireless sensor networks?

    Full text link
    In this paper we extend our previously designed trust model in wireless sensor networks to include both; communication trust and data trust. Trust management in wireless sensor networks is predominantly based on routing messages; whether the communication has happened or not (successful and unsuccessful transactions). The uniqueness of sensing data in wireless sensor networks introduces new challenges in calculating trust between nodes (data trust). If the overall trust is based on just the communication trust, it might mislead the network, that is; untrustworthy nodes in terms of sensed data can be classified as trusted nodes due to their communication capabilities. Hence we need to develop new trust models to address the issue of the actual sensed data. Here we are comparing the two trust models and proving that one model by itself is not enough to decide on the trustworthiness of a node, so new techniques are required to combine both data trust and communication trust. ©2008 IEEE

    Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

    Full text link
    Smartphones have become the most pervasive devices in people's lives, and are clearly transforming the way we live and perceive technology. Today's smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as accelerometer, gyroscope, microphone, and camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this paper, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the current state-of-the-art on the topic. We also outline novel research challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN

    Swarm Intelligence-Optimized Energy Management for Prolonging the Lifetime of Wireless Sensor Networks

    Get PDF
     Recent technological and industrial progress has enabled the development of small, high-performing, energy-saving, affordable sensor nodes that possess the potential to adapt, be self-aware, and self-organize. These nodes are designed for versatile communications applications. Sensor networks for sustainable development focus on the ways in which sensor network technology can enhance social development and improve living standards without causing harm to the environment or depleting natural resources. Wireless sensor networks (WSNs) offer undeniable benefits in various fields, including the military, healthcare, traffic monitoring, and remote image sensing. Given the constraints of sensor networks, varying degrees of security are necessary for these critical applications, posing difficulties in the implementation of conventional algorithms. The issue of security has emerged as a primary concern in the context of IoT and smart city applications. Sensor networks are often regarded as the fundamental building blocks of IoTs and smart cities. The WSN encompasses a routing algorithm, network strength, packet loss, energy loss, and various other intricate considerations. The WSN also addresses intricate matters such as energy usage, a proficient approach for picking cluster heads, and various other concerns. The recent growth of Wireless Sensor Networks (WSNs) has made it increasingly difficult to ensure the trustworthiness and reliability of data due to the distinct features and limitations of nodes. Hostile nodes can easily damage the integrity of the network by inserting fake and malicious data, as well as launching internal attacks. Trust-based security is employed to detect and identify rogue nodes, providing a robust and adaptable protection mechanism. Trust evaluation models are crucial security-enhancement mechanisms that enhance the reliability and collaboration of sensor nodes in wireless sensor networks. This study recommends the use of DFA UTrust, a unique trust technique, to effectively satisfy the security requirements of WSNs

    Lightweight Sensing Uncertainty Metric – Incorporating Accuracy and Trust

    Get PDF

    A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks

    Get PDF
    The decentralized administrative controlled-nature of mobile ad hoc networks (MANETs) presents security vulnerabilities which can lead to attacks such as malicious modification of packets. To enhance security in MANETs, Trust and Reputation Management systems (TRM) have been developed to serve as measures in mitigating threats arising from unusual behaviours of nodes. In this paper we propose a candour-based trust and reputation system which measures and models reputation and trust propagation in MANETs. In the proposed model Dirichlet Probability Distribution is employed in modelling the individual reputation of nodes and the trust of each node is computed based on the node’s actual network performance and the quality of the recommendations it gives about other nodes. Cooperative nodes in our model will be rewarded for expanding their energy in forwarding packets for other nodes or for disseminating genuine recommenda-tions. Uncooperative nodes are isolated and denied the available network resources. We employed the Ruffle algorithm which will ensure that cooperative nodes are allowed to activate sleep mode when their service is not required in forwarding packets for its neighbouring trustworthy nodes. The proposed TRM system enshrines fairness in its mode of operation as well as creating an enabling environment free from bias. It will also ensure a connected and capacity preserving network of trustworthy node

    Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges

    Get PDF
    Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently. In order to show the feasibility of secure VC, certain implementations are required. In [1] we discuss the design of a VC security system that has emerged as a result of the European SeVeCom project. In this second paper, we discuss various issues related to the implementation and deployment aspects of secure VC systems. Moreover, we provide an outlook on open security research issues that will arise as VC systems develop from today's simple prototypes to full-fledged systems
    • …
    corecore