PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks

  • PDF / 2,373,837 Bytes
  • 21 Pages / 595.224 x 790.955 pts Page_size
  • 91 Downloads / 191 Views

DOWNLOAD

REPORT


PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks Henry Nunoo-Mensah1 · Kwame Osei Boateng1 · James Dzisi Gadze2 Received: 30 August 2019 / Accepted: 19 March 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the ability of a node as a continuum based on the current battery level and outage probability of the network. PSTRM also utilise an Elliptic-Curve Cryptography Diffie-Hellman (ECCDH) privacy-aware dissemination framework which encourages the sharing of accurate and credible indirect reputation information within network neighbourhoods. The following social constructs, viz., ability, benevolence and consistency were considered in the design of the proposed model. The detection rate of the proposed model was evaluated against that by Rathore et al., using MATLAB. PSTRM was found to have high detection rates than the proposal by Rathore et al. Keywords Wireless sensor network · Security · Trust modelling · Sociopsychological constructs

1 Introduction A wireless sensor network (WSN) is comprised of numerous sensor nodes equipped with computation and communication capabilities. Critical applications such as patient health monitoring, military surveillance and asset tracking are some applications of WSNs. In most cases, the unattended deployment of WSNs pose a huge challenge in ensuring resource integrity, device availability and authorisation on the network and thus necessitates the mandatory provision of secured measures on the network. Security threats against such unattended WSNs include the following attack classes: interruption, interception, modification and fabrication [1]. Security and privacy challenges of WSNs must also be addressed to prevent systems from turning against those for whom they are intended to render benefits to [2]. The incorporation of security in WSN  Henry Nunoo-Mensah

[email protected] 1

Department of Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

2

Department of Telecommunication Engineering, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

is a daunting task which requires the design of complex schemes unlike those of traditional networks. The constraints include limited resource (compute, communication and storage) capabilities, unattended deployments and the low-cost sensor node design [3]. Considering these WSN constraints, every adopted security scheme for WSN need some form of optimisation [4]. Although external security attacks can be curbed using cryptographic mechanisms, these mechanisms are not very effective against internal insider attacks by malicious nodes [2]. In an attempt to curb