Open Access Open Access  Restricted Access Subscription or Fee Access

A Two -Way Trust Assurance of Aggregator Node for Ensuring Data Reliability in Wireless Sensor Networks

N. Chitradevi, V. Palanisamy, K. Baskaran, D. Aswini


Wireless Sensor Networks (WSNs) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, and to cooperatively pass their data through the network to a base station. Data Fusion/Aggregation can effectively reduce the volume of data transmission in the network, reduce the energy consumption to extend network lifetime and improve bandwidth utilization, as a result, it can overcome the restriction of energy and bandwidth. Moreover since a sensor is typically placed in locations that are accessible to malicious attackers, information assurance of the data fusion process is very important. In order to improve the performance in terms of assurance, overhead and delay, we proposed a novel trust based direct voting mechanism [1]. Our work employs trust metric to poll the witness nodes for in the process of data fusion assurance. In this paper we extended the work of [1] in terms of bottom-up approach where the child node can select the node (parent) to forward the data. Generally, a hierarchical data collection scheme is used by the sensors to report data to the base station, it is difficult to precisely identify and eliminate a compromised node in such a data collecting hierarchy. Most security schemes for sensor networks focuses on developing mechanism for nodes located higher in the hierarchy to monitor those located at lower levels. We propose a complementary mechanism with which the nodes at lower levels can monitor their parents in the hierarchy to identify the behavior, based on that child will select the parent node to forward the data. Every node maintains a reputation (trust) value of its parent and updates this at the end of every data reporting cycle. We propose a novel combination of statistical testing techniques and reinforcement learning schemes to manage the reputation of a parent node. In this paper baye’s theorem is used to evaluate the trust of nodes. The performance of proposed approach is evaluated and compared with previous approaches and found that our approach has a lower overhead than the previous approaches in terms of delay and energy consumption.


Wireless Sensor Networks, Data Fusion Assurance, Power-Efficient, Voting Mechanism, Witness Node, Bottom-Up Approach, Reputation

Full Text:



N. Chitradevi, V.Palanisamy, K. Baskaran D.Aswini and, “Secure Trust Based Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Network,” Proc. 2nd International Conference on IISM'11, 2011.

W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks,” Proc. IEEE Global Telecomm. Conf., vol. 3, pp. 1435- 1439, etc. 2003.

Hung-Ta Pai, S. Han “Power Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks” IEEE Journal, vol.57, Feb. 2008.

J. Deng, R. Han, and S. Mishra, “A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks,” Proc. Int’l Workshop Information Processing in Sensor Networks, pp. 349-364, 2003.

D. Culler, D. Estrin, and M. Srivastava, “Overview of Sensor Networks,” Computer, vol. 37, no. 8, pp. 41-49, Aug. 2004.

T.Liqin, L.Chuang, “Computation and Analysis of Node Intending Trust in WSNs”, IEEE Conference, 2000.

A. D’Costa, V. Ramachandran, and A.M. Sayeed, “Distributed Classification of Gaussian Space-Time Sources in Wireless Sensor

Networks,” IEEE J. Selected Areas Comm., vol. 22, no. 6, pp. 1026-1036, Aug. 2004.

D. Wagner, “Resilient Aggregation in Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 78-87, Oct. 2004.

T.-Y. Wang, Y.S. Han, B. Chen, and P.K. Varshney, “A Combined Decision Fusion and Channel Coding Scheme for Distributed Fault-Tolerant Classification in Wireless Sensor Networks,” IEEE Trans. Wireless Comm., 2006.

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 38, no. 8, pp. 102-114, Aug. 2002.

J. Lopez. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Secur., 14(5):469–482, 2006.

R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59–64, New York, NY, USA,2004. ACM.

D. C. Montgomery and G. C. Runger. Applied Statistics and Probability for Engineers. WILEY, 2006.

A. Josang and R. Ismail. The beta reputation system. In 15th Bled Electronic Commerce Conference, 2002.

C. J. C. H. Watkins and P. D. Dayan. Q-learning. Machine Learning, 3:279 – 292, 1992.

Oly Mistry, Anıl Gürsel, Sandip Sen, “Comparing Trust Mechanisms for Monitoring Aggregator Nodes in Sensor Networks”. Proc. AAMAS’ 09 8th international conferences on Autonomous Agents and Multiagent Systems, vol.2, 2009.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.