The double-edged sword: revealing the critical role of structural hole in forming trust for securing Wireless sensor networks

RIS ID

106141

Publication Details

M. Xiang, W. Liu, Q. Bai & A. Al-Anbuky, "The double-edged sword: revealing the critical role of structural hole in forming trust for securing Wireless sensor networks," in Proceedings of the 2015 International Telecommunication Networks and Applications Conference (ITNAC), 2015, pp. 286-291.

Abstract

Security issues for Wireless sensor network (WSN) is always crucial due to its nature. The limitation of computing resources and distributed properties in WSN makes the traditional security mechanisms no longer as feasible in protecting WSN as in wired networks. There is an emerging research area to discover the alternative solutions on trust and reputation mechanisms for WSNs nowadays. The recent studies on trust are mainly focusing on trust modeling so as to effectively detect and avoid malicious activities in the network. To be able to avoid the attacks, the existence of at least an alternative route in the network is required. In this paper, we introduced the new angle of adaptive network to study the interplay between network entities' trust evaluation and its underlie topological connectivity. Inspired from the trust studies in sociology, we found the structural hole has high efficiency in connecting different unconnected networks. But in the security side of view, it is also making the network fragile. These have been confirmed by extensive simulation studies.

Please refer to publisher version or contact your library.

Share

COinS
 

Link to publisher version (DOI)

http://dx.doi.org/10.1109/ATNAC.2015.7366827