Review of Trust Models in Wireless Sensor Networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32771
Review of Trust Models in Wireless Sensor Networks

Authors: V. Uma Rani, K. Soma Sundaram

Abstract:

The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. This paper discussed the kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network. It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.

Keywords: Attacks, Security, Trust, Trust model, Wireless sensor network.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1092175

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4510

References:


[1] Huaizhi Li and Mukesh Singhal, "Trust Management in distributed Systems”, IEEE Computer Society, pp: 45-53, 2007.
[2] Vishal Rathod, Mrudang Mehta, "Security in Wireless Sensor Network”, A survey in Journal of Engineering & Technology, Vol.-1, Issue-1, pp.35-45, 2011.
[3] Theodore Zahariadis, Helen C. Leligou, Panagiotis Trakadas and Stamatis Voliotis, "Mobile Networks- Trust management in wireless sensor networks” in European Transactions on Telecommunications, pp. 386–395, 2010.
[4] M.Blaze, J.Feigenbaum, and J.Lacy,”Decentralized Trust Management” in IEEE Symposium on Security and Privacy, pp.150-168, 1996.
[5] Ling Liu, Weisong Shi,” Trust and Reputation management” in IEEE Internet Computing, pp.1089-7801, 2010.
[6] S. Ganeriwal, L. K. Balzano, M. B. Srivastava, "Reputation-based framework for high integrity sensor networks” in ACM Transactions on Sensor Networks pp.1-37, 2008.
[7] Yang Guang, Yin Gui-sheng, Yang Wu et al, "Reputation Model based on behavior of sensor nodes in WSN”, in Journal on Communication, pp. 18-26, 2009.
[8] Xiao De-qin, Feng Jian-zhao, Yang Bo et al,” Reputation formal model for wireless sensor network” in Computer Science, pp.84-87,2007.
[9] Boukerch , L. Xu , K. EL-Khatib,”Trust-based security for wireless ad hoc and sensor networks” in Computer Communications, pp. 2413–2427,2007.
[10] Li Lin and Jinpeng Huai, "QGrid: An Adaptive Trust Aware Resource Management Framework”, in IEEE Systems Journal, Vol. 3, No. 1, pp. 78-90, 2007.
[11] Lei Huang , Lixiang Liu, "Extended Watchdog Mechanism for Wireless Sensor Networks” in Journal of Information and Computing Science Vol.3, No. 1, pp. 39-48,2008.
[12] Félix Gómez Mármol, Gregorio Martínez Pérez, "Providing trust in wireless sensor networks uses a bio-inspired technique” in Journal on communication, pp.86-94, 2008.
[13] S.K. Dhurandher, S. Misra, M.S. Obaidat, N. Gupta, "An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks” in Security and Communication Networks, pp. 215–224,2009.
[14] Suat Ozdemir, "Functional reputation based reliable data aggregation and transmission for wireless sensor networks” in Computer Communications pp 3941–3953, 2008.
[15] Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, and Xingwei Wang,” TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things” in ComSIS Vol. 8, No. 4, Special Issue, pp. 1208-1228. 2011.
[16] Anna Felkner, "How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks” in journal of telecommunications and information technology, pp. 70 -78, 2011.
[17] Guoxing Zhana, Weisong Shi, Julia Deng, "SensorTrust: A resilient trust model for wireless sensing systems”in Pervasive and Mobile Computing, pp.509–522, 2011.
[18] Theodore Zahariadis , Helen Leligou, Panagiotis Karkazis, Panagiotis Trakadas, Ioannis Papaefstathiou, Charalambos Vangelatos, Lionel Besson, "Design and Implementation Of A Trust-Aware Routing Protocol For Large WSN” in International Journal Of Network Security & Its Applications (IJNSA), Vol.2, No.3,pp.123-143,2010.
[19] Gu Xiang, Qiu Jianlina, Wang Jina, "Research on Trust Model of Sensor Nodes in WSNs” ,in International Workshop on Information and Electronics Engineering (IWIEE), pp.45-57,2012.
[20] Youngho Cho and Gang Qu, Yuanming Wu, "Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks” in IEEE Symposium on Security and Privacy Workshops, pp. 134-141,2012.
[21] S. Buchegger and J. Y. L. Boudec, "Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks)”, in The 3rd ACM Internationa symposium Mobile Ad-hoc Networking & Computing (MobiHoc '02), Lausanne, CH, 2002
[22] P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks” in The IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security Portoroz, Slovenia, 2002.
[23] X. Q. Li, M. R. Lyu and J. C. Liu, "A Trust Model Based Routing Protocol for Secure Ad-Hoc Networks” in Proceedings of the IEEE Conference on Aerospace, Big Sky,Montana, Vol. 2, 6-13 March 2004.
[24] A. A. Pirzada and C. McDonald, "Trusted Greedy Perimeter Stateless Routing in Proceedings of the 15th IEEE International Conference on Networks”, Adelaide, November, pp. 19-21,2007.
[25] S. Marti, T. Giuli, K. Lai and M. Baker,”Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks”in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ACM Press, Boston,( 6-11), pp. 255-265,2000.
[26] Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar ,”A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)” in Journal of Scientific Research Wireless Sensor Network, 3,pp 125-134,2010.
[27] Bhavna Arora Makin and Dev Anand Padha,”A Trust-Based Secure Data Aggregation Protocol for Wireless Sensor Networks” in IUP Journal of Information Technology, Vol. VI, No. 3,pp 7 – 22,2010.
[28] Nabila Labraoui,Mourad Gueroui,Makhlouf Aliouat,Jonathan Petit, "RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks” in Journal of Universal Computer Science, vol. 17, no. 11 , 1550-1571,2011.
[29] Ke Liu, Nael Abu-Ghazaleh , Kyoung-Don Kang, "Location verification and trust management for resilient geographic routing” in Journal of Parallel and Distributed Computing, 67,215 – 228,2007.
[30] Tae Kyung Kim, and Hee Suk Seo ,”A Trust Model using Fuzzy Logic in Wireless Sensor Network”in World Academy of Science, Engineering and Technology, 18, pp 61-66,2008.
[31] Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun Vijay Varadharajan and Abdul Sattar ,”A Trust Management Architecture for Hierarchical Wireless Sensor Networks” ,35th annual IEEE conference on local computer networks.LCN ,pp. 268-273,2010.
[32] Alzaid, Hani and Foo, Ernest and Gonzalez Nieto,”RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks”in Proceedings 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI), Dunedin, New Zealand, 2008.
[33] Mohammad Momani,”Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks” in Journal of networks,vol.5,no.7,pp.815-824,2010.
[34] Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, and Athanasios V. Vasilakos, "ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks” in IEEE transactions on information technology in biomedicine, vol. 16, no. 4, pp.623-632, 2012.
[35] Xiaoyong Li, Feng Zhou and Junping Du,”LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks” in IEEE transactions on information forensics and security,pp451-551, 2013.
[36] Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection” in IEEE Transactions on network and service management, vol. 9, no. 2, pp.169-183,2012.
[37] A. Srinivasan, J. Teitelbaum and J. Wu,”DRBTS: Distributed Reputation-based Beacon Trust System” in the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC’06), Indianapolis, USA, 2006.
[38] Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan and Abdul Sattar,”A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks” in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 484 -492, 2010.
[39] Pengzhi Shi, Haiguang Chen,”RASN: Resist on-off Attack for Wireless Sensor Networks” in 2nd International Conference on Computer Application and System Modeling "published by Atlantis Press, Paris, France, pp. 0690 to 0693, 2012.
[40] Sorav Bansal, Mary Baker, "Observation-based Cooperation Enforcement in adhoc networks” pp702-708, 2003.
[41] Guoxing Zhan, Weisong Shi, and Julia Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs” in IEEE Transactions on Dependable and secure computing vol.9, pp.184-196,2012.
[42] Younghun chae, "Redeemable reputation based secure routing protocol for wireless sensor networks”, a thesis in university of rhode island, pp.1-55,2012.
[43] Félix Gómez Mármol, Gregorio Martínez Pérez,”Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems” in Computer Standards & Interfaces Vol.no32, pp.185–196,2010.
[44] A. Boukerch, L. Xu , K. EL-Khatib, "Trust-based security for wireless ad hoc and sensor network” in Computer Communications Vol no 30 , pp. 2413–2427,2010.
[45] Javier Lopez , Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago, "Trust management systems for wireless sensor networks:” in Best practices in Computer Communications Vol no 33 ,pp. 1086–1093,2010.
[46] Sudip Misra, Ankur Vaish "Reputation-based role assignment for role-based access control in wireless sensor networks” in Computer Communications Vol.no. 34, pp. 281–294, 2011.
[47] Kevin hoffman, David zage, Cristina nita-rotaru,” A Survey of Attack and Defense Techniques for Reputation Systems ” in ACM Computing Surveys, Vol. 42, No. 1, Article 1, December 2009.