Calculating trust in sensor networks
Calculating trust in sensor networks
Calculating trust in sensor networks
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
HELSINGIN YLIOPISTO — HELSINGFORS UNIVERSITET — UNIVERSITY OF HELSINKI<br />
Tiedekunta — Fakultet — Faculty Laitos — Institution — Department<br />
Faculty of science Department of computer science<br />
Tekijä — Författare — Author<br />
Ari Karjala<strong>in</strong>en<br />
Työn nimi — Arbetets titel — Title<br />
<strong>Calculat<strong>in</strong>g</strong> <strong>trust</strong> <strong>in</strong> <strong>sensor</strong> <strong>networks</strong><br />
Oppia<strong>in</strong>e — Läroämne — Subject<br />
Computer science<br />
Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages<br />
Pro gradu thesis September 22, 2009 66 pages<br />
Tiivistelmä — Referat — Abstract<br />
Sensor <strong>networks</strong> can benefit from a <strong>trust</strong> management scheme. A <strong>sensor</strong> network can become<br />
more resilient aga<strong>in</strong>st node capture if every node <strong>in</strong> the network monitors their neighbours. The<br />
<strong>in</strong>formation of how one node <strong>trust</strong>s another can also be used <strong>in</strong> rout<strong>in</strong>g. Trust-based rout<strong>in</strong>g tries<br />
to forward traffic through more <strong>trust</strong>worthy nodes, so that malicious nodes could <strong>in</strong>terfere with the<br />
operation of the network. The route through which a packet traverses then forms a cha<strong>in</strong> of <strong>trust</strong><br />
from one node to another. This cha<strong>in</strong> can further be used to measure the <strong>trust</strong>worth<strong>in</strong>ess of distant<br />
nodes. This thesis evaluates how a <strong>trust</strong> management solution behaves <strong>in</strong> a <strong>sensor</strong> network, and<br />
what k<strong>in</strong>ds of <strong>trust</strong> cha<strong>in</strong>s the solution creates when malicious nodes are <strong>in</strong>troduced to the network.<br />
Results show that, given some <strong>in</strong>accuracies, such a scheme can be used to identify un<strong>trust</strong>worthy<br />
nodes from far away.<br />
ACM Comput<strong>in</strong>g Classification System (CCS):<br />
C.2 [Computer-Communication Networks: Security and protection],<br />
C.2.3 [Network Operations: Network management],<br />
C.2.2 [Network Protocols: Rout<strong>in</strong>g protocols]<br />
Ava<strong>in</strong>sanat — Nyckelord — Keywords<br />
<strong>sensor</strong> network, <strong>trust</strong> management, rout<strong>in</strong>g, <strong>trust</strong>-based rout<strong>in</strong>g, network simulation<br />
Säilytyspaikka — Förvar<strong>in</strong>gsställe — Where deposited<br />
Kumpula Science Library, series C-2009-<br />
Muita tietoja — övriga uppgifter — Additional <strong>in</strong>formation