13.01.2013 Views

Calculating trust in sensor networks

Calculating trust in sensor networks

Calculating trust in sensor networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HELSINGIN YLIOPISTO — HELSINGFORS UNIVERSITET — UNIVERSITY OF HELSINKI<br />

Tiedekunta — Fakultet — Faculty Laitos — Institution — Department<br />

Faculty of science Department of computer science<br />

Tekijä — Författare — Author<br />

Ari Karjala<strong>in</strong>en<br />

Työn nimi — Arbetets titel — Title<br />

<strong>Calculat<strong>in</strong>g</strong> <strong>trust</strong> <strong>in</strong> <strong>sensor</strong> <strong>networks</strong><br />

Oppia<strong>in</strong>e — Läroämne — Subject<br />

Computer science<br />

Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages<br />

Pro gradu thesis September 22, 2009 66 pages<br />

Tiivistelmä — Referat — Abstract<br />

Sensor <strong>networks</strong> can benefit from a <strong>trust</strong> management scheme. A <strong>sensor</strong> network can become<br />

more resilient aga<strong>in</strong>st node capture if every node <strong>in</strong> the network monitors their neighbours. The<br />

<strong>in</strong>formation of how one node <strong>trust</strong>s another can also be used <strong>in</strong> rout<strong>in</strong>g. Trust-based rout<strong>in</strong>g tries<br />

to forward traffic through more <strong>trust</strong>worthy nodes, so that malicious nodes could <strong>in</strong>terfere with the<br />

operation of the network. The route through which a packet traverses then forms a cha<strong>in</strong> of <strong>trust</strong><br />

from one node to another. This cha<strong>in</strong> can further be used to measure the <strong>trust</strong>worth<strong>in</strong>ess of distant<br />

nodes. This thesis evaluates how a <strong>trust</strong> management solution behaves <strong>in</strong> a <strong>sensor</strong> network, and<br />

what k<strong>in</strong>ds of <strong>trust</strong> cha<strong>in</strong>s the solution creates when malicious nodes are <strong>in</strong>troduced to the network.<br />

Results show that, given some <strong>in</strong>accuracies, such a scheme can be used to identify un<strong>trust</strong>worthy<br />

nodes from far away.<br />

ACM Comput<strong>in</strong>g Classification System (CCS):<br />

C.2 [Computer-Communication Networks: Security and protection],<br />

C.2.3 [Network Operations: Network management],<br />

C.2.2 [Network Protocols: Rout<strong>in</strong>g protocols]<br />

Ava<strong>in</strong>sanat — Nyckelord — Keywords<br />

<strong>sensor</strong> network, <strong>trust</strong> management, rout<strong>in</strong>g, <strong>trust</strong>-based rout<strong>in</strong>g, network simulation<br />

Säilytyspaikka — Förvar<strong>in</strong>gsställe — Where deposited<br />

Kumpula Science Library, series C-2009-<br />

Muita tietoja — övriga uppgifter — Additional <strong>in</strong>formation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!