METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
First Claim
1. A method of trust management in wireless sensor networks, comprising the steps of:
- each node in a group calculating individual trust values for all group members, assigning one of trust states based on the trust values to other nodes in the group and forwarding the assigned trust states to a cluster-head;
the cluster-head assigning a global trust state to each node based on the relative difference in trust states for the node.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to Group-based trust management scheme (GTMS) of wireless sensor networks. GTMS evaluates the trust of a group of sensor nodes in contrast to traditional trust management schemes that always focused on trust values of individual nodes. This approach gives us the benefit of requiring less memory to store trust records at each sensor node in the network. It uses the clustering attributes of wireless sensor networks that drastically reduce the cost associated with trust evaluation of distant nodes. Uniquely it provides not only a mechanism to detect malicious or faulty nodes, but also provides some degree of a prevention mechanism.
-
Citations
15 Claims
-
1. A method of trust management in wireless sensor networks, comprising the steps of:
-
each node in a group calculating individual trust values for all group members, assigning one of trust states based on the trust values to other nodes in the group and forwarding the assigned trust states to a cluster-head; the cluster-head assigning a global trust state to each node based on the relative difference in trust states for the node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
2. The method according to claim 1, wherein said trust states include trusted, un-trusted and un-certain.
-
3. The method according to claim 2, if a node has any past experience between other nodes, then trust value is calculated using time-based past interaction.
-
4. The method according to claim 3, said time-based past interaction is calculated using the equation
-
[ 100 ( S x , y S x , y + U x , y ) ( 1 - 1 S x , y + 1 ) ] = [ 100 ( S x , y ) 2 ( S x , y + U x , y ) ( S x , y + 1 ) ] wherein [.] is nearest integer function, Sx,y is the total number of successful interactions of node x with node y during predetermined time, Ux,y is the total number of unsuccessful interactions of node x with node y during the predetermined time.
-
-
5. The method according to claim 2, if a node does not have any past experience between nodes, then trust value is calculated using peer recommendations.
-
6. The method according to claim 5, node x calculates the trust value of node y using
-
i ∈ R x ⋃ C x T x , i * T i , y 100 * j ] ; where, [.] is the nearest integer function, Tx,i is the trust value of recommender, and Ti,y is the trust value of node y sent by node i assuming that j nodes are trusted and uncertain in a group.
-
-
7. The method according to claim 2, each node will quantize trust values into three states using the following equation:
-
wherein f is the half of the average values of all trusted nodes, g is the one third of the average values of all untrusted nodes.
-
-
8. The method according to claim 7, f is calculated using
-
( ∑ i ∈ R x T x , i R x ) ] 0 < R x ≤ n - 1 f j R x = 0 and g is calculated using g j + 1 = { [ 1 3 ( ∑ i ∈ M x T x , i M x ) ] 0 < M x ≤ n - 1 g j M x = 0 wherein Rx represents the set of trusted nodes for node x, Mx is the set of un-trusted nodes for node x, and n is the total number of nodes that contains trusted.
-
-
9. The method according to claim 2, said cluster-head defines a random variable X such that
-
( s i , j ) = { 2 when s i , j = trusted 1 when s i , j = un - certain 0 when s i , j = un - trusted and for m such random variables said cluster-head defines the following standard normal random variable for a node j wherein Sch,j represents the state of node j at cluster-head ch, and said cluster-head assigns the global trust state to each node such that if Zj□
[−
1, 1] then the node j is assigned to be un-certain, if Zj>
1, trusted, and if Zj<
−
1, un-trusted.
-
-
10. The method according to claim 2, a base station receives from each cluster-head the trust values of other cluster-heads and calculates the trust value of each group using
-
i = 1 G - 1 ( T BS , ch i ) ( T G i , G 1 ) G - 1 ] , … , T BS , G m = [ ∑ i = 1 G - 1 ( T BS , ch i ) ( T G i , G G ) G - 1 ] wherein TBS,chi is the trust value of the cluster-head i at the base station, Tgi,G1 is the trust value of group G1 at group Gi and |G| represents the number of groups in the network.
-
-
11. The method according to claim 10, the cluster-head requests the base station for the trust value of another cluster-head if it does not have any record of past interactions within a predetermined time window with said another cluster-head.
-
12. The method according to claim 10, the base station assigns one of the three possible states to the whole group based on the trust values.
-
13. The method according to claim 2, the cluster-head is a sensor node that has higher computational power and memory as compared to other sensor nodes.
-
14. The method according to claim 2, the cluster-head periodically broadcast the trust state request packet within the group.
-
15. The method according to claim 10,
the base station periodically multicast request packets to the cluster-heads, and on request, the cluster-heads forward their trust vector related to the recommendations of other groups based on past interactions to base station as follows T ch=(Tch,1,Tch,2, . . . ,Tch,|G|−- 1)
wherein Tch,i represents the trust value of another cluster j calculated at cluster-head ch.
- 1)
-
2. The method according to claim 1, wherein said trust states include trusted, un-trusted and un-certain.
-
Specification
- Resources
-
Current AssigneeIndustry-Academic Cooperation Foundation Yonsei University, Zscaler Incorporated
-
Original AssigneeIndustry-Academic Cooperation Foundation Yonsei University
-
InventorsSHAIKH, Riaz Ahmed, LEE, Sung Young, LEE, Young Koo
-
Application NumberUS12/178,722Publication NumberTime in Patent OfficeDaysField of SearchUS Class Current726/3CPC Class CodesH04L 63/12 Applying verification of th...H04L 67/12 specially adapted for propr...