{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:13:16Z","timestamp":1654096396074},"reference-count":28,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Integration of trusted information is an important requirement from business application. As business applications adaption relies on sensor data, that information must be trustworthy enough in order to prevent any misuse of sensor data. For example, the use of un-trustworthy information in healthcare system can have severe consequence on patient life. But it appears that sensors are not tamper resistant enough in order to prevent any capture of cryptographic material stored on the nodes. Therefore, a soft security alternative of hardening security mechanisms is to ensure trustworthiness of sensor data. From its production on the node to its delivery to the business application, and including its processing and forwarding, the authors propose to assess sensor data along its life-cycle. In this paper, the authors propose a framework for the assessment of sensor data trustworthiness, from the acquisition at the node to their delivery to business applications, including any intermediary routing or processing. The assessment aims at identifying erroneous sensor data caused intentionally or unintentionally. In addition, the authors evaluate their approach with real sensor data acquired in the scope of the WASP project (http:\/\/www.wasp-project.org - Wirelessly Accessible Sensor Populations - IST 034963) during a herd control experiment.<\/p>","DOI":"10.4018\/ijaeis.2013100101","type":"journal-article","created":{"date-parts":[[2014,3,11]],"date-time":"2014-03-11T17:20:39Z","timestamp":1394558439000},"page":"1-24","source":"Crossref","is-referenced-by-count":1,"title":["Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application"],"prefix":"10.4018","volume":"4","author":[{"given":"Laurent","family":"Gomez","sequence":"first","affiliation":[{"name":"SAP Research, Mougins, France"}]},{"given":"Michel","family":"Riveill","sequence":"additional","affiliation":[{"name":"Laboratoire I3S (UMR 7271 UNS \/ CNRS), Sophia Antipolis, France"}]}],"member":"2432","reference":[{"key":"ijaeis.2013100101-0","unstructured":"Buchegger, S., & Boudec, J.-Y. L. (2004). A robust reputation system for p2p and mobile ad-hoc networks. In the proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems."},{"key":"ijaeis.2013100101-1","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/935457"},{"key":"ijaeis.2013100101-2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470611883"},{"key":"ijaeis.2013100101-3","doi-asserted-by":"crossref","unstructured":"Covington, M., Ahamd, M., Essal, I., & Venkateswaran, H. (2004). Parametrized authentication. In the proceedings of ESORICS, 2004.","DOI":"10.1007\/978-3-540-30108-0_17"},{"key":"ijaeis.2013100101-4","doi-asserted-by":"publisher","DOI":"10.5121\/ijans.2012.2206"},{"key":"ijaeis.2013100101-5","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., & Srivastava, M. (2004). Reputation-based framework for high integrity sensor networks. In the proceeding of the ACM ESAS Workshop (pp. 66-77).","DOI":"10.1145\/1029102.1029115"},{"key":"ijaeis.2013100101-6","author":"J.Golbeck","year":"2003","journal-title":"Trust networks on the semantic web"},{"key":"ijaeis.2013100101-7","doi-asserted-by":"crossref","unstructured":"Gomez a L. & Ulmer, C. (2010). Secure sensor networks for critical infrastructure protection. In the proceedings of the Fourth International Conference on Sensor Technologies and Applications.","DOI":"10.1109\/SENSORCOMM.2010.30"},{"key":"ijaeis.2013100101-8","article-title":"Fault-tolerant clustering of wireless sensor networks.","author":"G.Gupta","year":"2005","journal-title":"Proceedings - IEEE INFOCOM"},{"key":"ijaeis.2013100101-9","doi-asserted-by":"crossref","unstructured":"H\u00e4m\u00e4l\u00e4inen, P., Kuorilehto, M., Alho, T., H\u00e4nnik\u00e4inen, M., & H\u00e4m\u00e4l\u00e4inen, T. D. (2006). Security in wireless sensor networks: Considerations and experiments. In SAMOS proceedings (pp. 167-177).","DOI":"10.1007\/11796435_18"},{"key":"ijaeis.2013100101-10","doi-asserted-by":"crossref","unstructured":"Harte, S., & Rahman, A. (2005). Fault tolerance in sensor networks using self-diagnosing sensor nodes. In the proceedings of IEEE International Workshop on Intelligent Environment.","DOI":"10.1049\/ic:20050211"},{"key":"ijaeis.2013100101-11","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., & Winslett, M. (2007). Introducing secure provenance: Problems and challenges. In the proceedings of the 2007 ACM workshop on Storage security and survivability, StorageSS\u201907 (pp. 13-18).","DOI":"10.1145\/1314313.1314318"},{"key":"ijaeis.2013100101-12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"ijaeis.2013100101-13","unstructured":"Josang, A., & Pope, S. (2005). Semantic constraints for trust transitivity. In the proceedings of the APCCM."},{"key":"ijaeis.2013100101-14","doi-asserted-by":"crossref","unstructured":"Koo, C. (2004), Broadcast in radio networks tolerating byzantine adversarial behavior. In the Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing (pp. 275-282).","DOI":"10.1145\/1011767.1011807"},{"key":"ijaeis.2013100101-15","doi-asserted-by":"crossref","unstructured":"Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. In ACM Transactions on Programming Language and Systems, 4, 382-401.","DOI":"10.1145\/357172.357176"},{"key":"ijaeis.2013100101-16","author":"D. H.McKnight","year":"1996","journal-title":"The meanings of trust"},{"key":"ijaeis.2013100101-17","unstructured":"Mol, R. D., Bleumer, E., Hogewerf, P., & Ipema, A. (2009). Recording of dairy cow behaviour with wireless accelerometers. In Joint International Agricultural Conference proceedings."},{"key":"ijaeis.2013100101-18","doi-asserted-by":"crossref","unstructured":"Ngai, E. H., & Lyu, M. (2004). Trust and clustering-based authentication services in mobile ad hoc networks. In the Proceedings of ICDCS Workshops (pp. 582-587).","DOI":"10.1109\/ICDCSW.2004.1284091"},{"key":"ijaeis.2013100101-19","unstructured":"NIST - National Institute of Standards and Technology. (2010). Exponential smoothing forecasting. Engineering Statistics Handbook, from http:\/\/www.itl.nist.gov\/div898\/handbook\/index.htm"},{"key":"ijaeis.2013100101-20","author":"M.Raya","year":"2007","journal-title":"On data-centric trust establishment in ephemeral ad hoc networks. Technical Report"},{"key":"ijaeis.2013100101-21","unstructured":"Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J.-P. (2008). Subjective logic based trust model for mobile ad-hoc networks. In the proceedings of the 4th International Conference on Security and Privacy in Communications Networks."},{"key":"ijaeis.2013100101-22","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"G.Shafer","year":"1976","journal-title":"A mathematical theory of evidence"},{"key":"ijaeis.2013100101-23","author":"A.Tanenbaum","year":"2001","journal-title":"Distributed systems: Principles and paradigms"},{"key":"ijaeis.2013100101-24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1009.I9P0339"},{"key":"ijaeis.2013100101-25","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Yu, T., & Ning, P. (2006). A framework for identifying compromised nodes in sensor networks. In Proceedings of the IEEE SecureComm.","DOI":"10.1109\/SECCOMW.2006.359546"},{"key":"ijaeis.2013100101-26","doi-asserted-by":"crossref","unstructured":"Zhang, W., Das, S., & Liu, Y. (2006). A trust based framework for secure data aggregation on wireless sensor networks. In IEEE SECON proceedings.","DOI":"10.1109\/SAHCN.2006.288409"},{"key":"ijaeis.2013100101-27","author":"Y. G.Zhang","year":"2006","journal-title":"Body sensor networks"}],"container-title":["International Journal of Agricultural and Environmental Information Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=102942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T14:46:23Z","timestamp":1654094783000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijaeis.2013100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijaeis.2013100101","relation":{},"ISSN":["1947-3192","1947-3206"],"issn-type":[{"value":"1947-3192","type":"print"},{"value":"1947-3206","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}