Trust management in WSN – a case study

Janusz Górski, Alan Turower

Abstract


The paper presents a case study related to application of WSN to supporting a patient with overweight in his/her home environment. It was assumed that the network implements a method of distributed trust management and is was demonstrated that this method provides for detection and isolation of sensors violating the network policies. Quantitative estimates of time necessary to detect such malicious nodes were obtained with the help of a dedicated network simulator. In conclusion we identified problems which will be further investigated, targeting at improvement and assessment of the proposed trust management method.

Keywords


wireless sensor networks; medical applications; trust; security

Full Text:

PDF (Polski)

References


Stankovic J. A.: Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges, Technical Report CS-2006-11, Uniwersytet Virginia, 2005.

Virone G. i in.: An Advanced Wireless Sensor Network for Health Monitoring, w Proceedings of the Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare, 2006.

Description of Final ANGEL Demonstrator w ANGEL Project Report; Deliverable D5.2, ANGEL Project, 2007.

Neves P. i in.: Simulation tools for wireless sensor networks in medicine: a comparative study, w in Proceedings of the First International Conference on Biomedical Electronics and Devices, IODEVICES 2008, Funchal, Madeira, Portugalia, 2008, s. 11 Kl 14.

Song F., Zhao B.: Trust-based LEACH Protocol for Wireless Sensor Networks, w Second International Conference on Future Generation Communication and Networking, 2008, s. 202-207.

Heinzelman W. R., Chandrakasan A., Balakrishnan H.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks, w Proc. of the Hawaii International Conference on System Sciences, 2000:

Borucki B.: Ochrona poufności i bezpieczeństwa medycznych danych osobowych, ICM UW http://kardionet.icm.edu.p1/c/document_library/get_file7p_l_id=10415&folderld=12450& name=DLFE-602.pdf, 2008; odczytany 11.03.2012.

Ustawa o ochronie danych osobowych, Dz.U. 1997 Nr 133 poz. 883 z późniejszymi zmianami.

European Union Directive on Data Protection, Off. J. Eur. Commun., Vol. 31 (281), 1995.

Rozporządzenie ministra zdrowia z dnia 21 grudnia 2006 r. w sprawie rodzajów i zakresu dokumentacji medycznej w zakładach opieki zdrowotnej oraz sposobu jej przetwarzania, Dz.U. 2006 Nr 247 poz. 1819.

Gołaszewski G., Górski J.: Context sensitive privacy management in a distributed environment, Lecture Notes in Computer Science, 2010, LNCS 6426, Springer, s. 639^-655.

Górski J., Turower A., Wardziński A.: Distributed Trust Management Model for Wireless Sensor Networks, na Sixth International Conference on Dependability and Computer Systems DepCoS-RELCOMEX, 2011.

Górski J., Turower A.: Two-tier distributed trust management model for wireless sensor networks, na Forum Innowacji Młodych Badaczy, 2011.

IEEE: Standard 802.15.4.




DOI: http://dx.doi.org/10.21936/si2012_v33.n3A.121