Abstract
Trust estimation approaches in wireless sensor networks (WSNs) are mainly used to improve security, reliability, system efficiency, lifespan, decision-making, and collaboration (dependability) among sensor nodes. There are various existing trust estimation approaches incompetent to satisfy the fundamental requirements of WSN, like resource (power, energy, communication bandwidth) efficiency, long network lifetime, node availability, communication, and memory overheads. In this paper, we provide an efficient and accurate weight-based trust management approach that employs communication (direct, indirect) trust and data trust along with compressive sensing technique to alleviate several internal attacks like badmouthing, black-hole, and grey-hole attacks for clustered WSN. The core part of the proposed scheme is an efficient trust estimation function. The proposed trust estimation function computes the communication trust as well as data trust to analyze the cooperation level and data consistency respectively for better decision making. Although, existing schemes do not incorporate data trust during trust evaluation which leads to incorrect trust decisions. Moreover, the proposed reliable trust model which is known as RTM that provides adaptability and flexibility in terms of application requirements with reduced transmission overhead. RTM employs a simple, lightweight, and flexible approach for trust estimation. RTM uses a hybrid approach within clusters as well as with clusters to reduce communication overhead.RTM employs the concept of a directly (direct) trusted node and resolves the weight-assignment problem of existing weighted trust models of WSNs. Furthermore, this paper presents motivation and vision for WSNs as well as emphasizes the strength of the weighted approach by assigning suitable weights according to application requirements. The proposed trust model has been compared with the existing state-of-the-art trust models such as LDTS, LWTM, etc. Experimental results demonstrate excellent performance in terms of malicious behavior detection, prevention, the detection accuracy of selfish nodes, cooperation, as well as resource efficiency to protect WSN. RTM can detect 2.10%, 12.63%, 15.78% more malicious nodes than LWTM (Singh et al. in IETE J Res 63(3):297–308, 2017), ADCT (Talbi et al. in Telecommun Syst 65(4):605–619, 2017), LDTS (Li et al. in IEEE Trans Inf Forensics Secur 8(6):924–935, 2013) respectively in the network consisting of 500 nodes. Moreover, RTM can accurately detect 10%, and 12% more malicious nodes than LTS (Khan et al. in IEEE Access 7:58221–58240, 2019) and ADCT respectively in the presence of malicious nodes. Furthermore, RTM has 50%, 98% less inter-cluster communication overhead than LWTM, and ADCT in the presence of 100 clusters in the network.
Similar content being viewed by others
Data availability
The datasets generated and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
Momani, M. (2010). Trust models in wireless sensor networks: A survey. In International conference on network security and applications. Springer.
Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662–667.
Nayak, P., & Vathasavai, B. (2017). Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic. IEEE Sensors Journal, 17(14), 4492–4499.
Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Sensors Journal, 12(10), 2941–2949.
Kimoto, A., Sugitani, N., & Fujisaki, S. (2010). A multifunctional tactile sensor based on PVDF films for identification of materials. IEEE Sensors Journal, 10(9), 1508–1513.
Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.
Ganeriwal, S., & Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop security of ad hoc and sensor networks (SASN ’04) (pp. 66–67).
Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the third IEEE international conference on mobile ad-hoc and sensor systems (MASS ’06) (pp. 437–446).
Boukerche, A., Li, X., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30, 2413–2427.
Zhang, J., et al. (2010). A trust management architecture for hierarchical wireless sensor networks. In IEEE local computer network conference. IEEE.
Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
Li, X., Zhou, F., & Junping, Du. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.
Frampton, K. D. (2006). Acoustic self-localization in a distributed sensor network. IEEE Sensors Journal, 6(1), 166–172.
Kumar, A., Srivastava, V., Singh, M. K., & Hancke, G. P. (2014). Current status of the IEEE 1451 standard-based sensor applications. IEEE Sensors Journal, 15(5), 2505–2513.
Singh, M., et al. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297–308.
Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor networks. IEEE Transactions on Wireless Communications, 10(11), 3973–3983.
Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, 18(15), 6446–6460.
Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690.
Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869.
Yang, L., Yinzhi, Lu., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404–71412.
Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.
Talbi, S., et al. (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommunication Systems, 65(4), 605–619.
Ishmanov, F., Kim, S., & Nam, S. (2014). A secure trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.
Górski, J., & Turower, A. (2018). A method of trust management in wireless sensor networks. International Journal of Security, Privacy, and Trust Management, 7, 1–19.
Rani, R., Kumar, S., & Dohare, U. (2019). Trust evaluation for light weight security in sensor enabled internet of things: Game theory oriented approach. IEEE Internet of Things Journal, 6(5), 8421–8432.
Meng, W., Choo, K.-K.R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management, 15(2), 761–773.
Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144.
Khan, T., Singh, K., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering-based approach for large scale wireless sensor networks. IEEE Access, 7, 58221–58240.
AlSkaif, T., Zapata, M. G., & Bellalta, B. (2015). Game theory for energy efficiency in wireless sensor networks: Latest trends. Journal of Network and Computer Applications, 54, 33–61.
Abrardo, A., Balucanti, L., & Mecocci, A. (2013). A game theory distributed approach for energy optimization in WSNs. ACM Transactions on Sensor Networks (TOSN), 9(4), 44.
Ai, X., Srinivasan, V., & Tham, C.-K. (2008). Optimality and complexity of pure Nash equilibria in the coverage game. IEEE Journal on Selected Areas in Communications, 26(7), 1170–1182.
Asadi, M., Zimmerman, C., & Agah, A. (2013). A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security, 15(1), 50–58.
Bharathi, M. A., & Vijaya Kumar, B. P. (2012). Reverse game theory approach for aggregator nodes selection with ant colony optimization based routing in wireless sensor network. International Journal of Computer Science Issues (IJCSI), 9(6), 292.
Cano, C., Bellalta, B., Sfairopoulou, A., & Barceló, J. (2009). A low power listening MAC with scheduled wake up after transmissions for WSNs. IEEE Communications Letters, 13(4), 221–223.
Chao, C.-M., & Hsiao, T.-Y. (2014). Design of structure-free and energy-balanced data aggregation in wireless sensor networks. Journal of Network and Computer Applications, 37, 229–239.
Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54(18), 3421–3430.
Chen, Z., Qiao, C., Qiu, Y., Li, Xu., & Wei, Wu. (2014). Dynamics stability in wireless sensor networks active defense model. Journal of Computer and System Sciences, 80(8), 1534–1548.
Dai, L., Chang, Y., & Shen, Z. (2011). A non-cooperative game algorithm for task scheduling in wireless sensor networks. International Journal of Computers Communications and Control, 6(4), 592–602.
Delicato, F., Protti, F., De Rezende, J. F., Rust, L., & Pirmez, L. (2005). Application-driven node management in multihop wireless sensor networks. In International conference on networking (pp. 569–576). Springer.
Duan, J., Gao, D., Yang, D., Foh, C. H., & Chen, H.-H. (2014). An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet of Things Journal, 1(1), 58–69.
Edalat, N., Tham, C.-K., & Xiao, W. (2012). An auction-based strategy for distributed task allocation in wireless sensor networks. Computer Communications, 35(8), 916–928.
Guerrero-Zapata, M., Zilan, R., Barceló-Ordinas, J. M., Bicakci, K., & Tavli, B. (2010). The future of security in wireless multimedia sensor networks. Telecommunication Systems, 45(1), 77–91.
Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.
Hao, X.-C., Zhang, Y.-X., Jia, N., & Liu, B. (2013). Virtual game-based energy balanced topology control algorithm for wireless sensor networks. Wireless personal communications, 69(4), 1289–1308.
Hao, X.-C., Gong, Q.-Q., Hou, S., & Liu, B. (2014). Joint channel allocation and power control optimal algorithm based on non-cooperative game in wireless sensor networks. Wireless personal communications, 78(2), 1047–1061.
He, X., & Gui, X. (2009). The localized area coverage algorithm based on game-theory for WSN. JNW, 4(10), 1001–1008.
Jing, H., & Aida, H. (2010). Cooperative clustering algorithms for wireless sensor networks. Smart Wireless Sensor Networks, 2010, 157.
Karl, H., & Willig, A. (2007). Protocols and architectures for wireless sensor networks. Wiley.
Komali, R. S., MacKenzie, A. B., & Gilles, R. P. (2008). Effect of selfish node behavior on efficient topology design. IEEE Transactions on Mobile Computing, 7(9), 1057–1070.
Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking (TON), 14(6), 1167–1178.
Wu, R., Deng, X., Rongxing, Lu., & Shen, X. (2015). Trust-based anomaly detection in emerging sensor networks. International Journal of Distributed Sensor Networks, 11(10), 363569.
Henna, S. (2017). Energy efficient fault tolerant coverage in wireless sensor networks. Journal of Sensors, 2017, 7090782.
Langendoen, K., & Meier, A. (2010). Analyzing MAC protocols for low data-rate applications. ACM Transactions on Sensor Networks (TOSN), 7(2), 19.
Liao, W.-H., Kao, Y., & Fan, C.-M. (2008). Data aggregation in wireless sensor networks using ant colony algorithm. Journal of Network and Computer Applications, 31(4), 387–401.
Liu, A.-F., Zhang, P.-H., & Chen, Z.-G. (2011). Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. Journal of Parallel and Distributed Computing, 71(10), 1327–1355.
Liu, H., Liu, G., Liu, Y., Mo, L., & Chen, H. (2014). Adaptive quantization for distributed estimation in energy-harvesting wireless sensor networks: A game-theoretic approach. International Journal of Distributed Sensor Networks, 10(7), 217918.
Luo, J., Pan, C., Li, R., & Ge, F. (2012). Power control in distributed wireless sensor networks based on noncooperative game theory. International Journal of Distributed Sensor Networks, 8(12), 398460.
Meshkati, F., Vincent Poor, H., & Schwartz, S. C. (2007). Energy-efficient resource allocation in wireless networks: An overview of game-theoretic approaches. arXiv:0705.1787
Nasser N,ChenY.SEEM:secure and energy-efficient multipath routing protocol for wireless sensor networks.ComputCommun2007;30(11–12):2401–12.
Pandana, C., Han, Z., & Ray Liu, K. J. (2008). Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks. IEEE Transactions on Wireless Communications, 7(8), 3150–3163.
Pantazis, N. A. (2007). Survey on power control issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 9(4), 86–107.
Yin, X., & Li, S. (2019). Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 198.
Muaddi, A. B., & Tomko, A. A. (2008). Intrusion detection system for wireless networks. U.S. Patent 7,366,148, issued April 29, 2008.
Wu, X., Chen, G., & Das, S. K. (2008). Avoiding energy holes in wireless sensor networks with nonuniform node distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 710–720.
Younis, M., Senturk, I. F., Akkaya, K., Lee, S., & Senel, F. (2014). Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks, 58, 254–283.
Rathore, H., Badarla, V., & George, K. J. (2016). Sociopsychological trust model for wireless sensor networks. Journal of Network and Computer Applications, 62, 75–87.
Zarifzadeh, S., & Yazdani, N. (2013). Neighbor selection game in wireless ad hoc networks. Wireless Personal Communications, 70(2), 617–640.
Zeydan, E., Kivanc, D., Comaniciu, C., & Tureli, U. (2012). Energy-efficient routing for correlated data in wireless sensor networks. Ad Hoc Networks, 10(6), 962–975.
Zheng, J., Bhuiyan, M. Z. A., Liang, S., Xing, X., & Wang, G. (2014). Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Generation Computer Systems, 39, 88–99.
Zhang, H., & Hou, J. C. (2005). On the upper bound of α-lifetime for large sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 272–300.
Pandey, A., & Tripathi, R. C. (2010). A survey on wireless sensor networks security. International Journal of Computer Applications, 3(2), 43–49.
Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: honey bee mating intelligence approach. Procedia Technology, 10, 515–523.
Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. (2019). TBRS: A trust based recommendation scheme for vehicular CPS network. Future Generation Computer Systems, 92, 383–398.
Feng, R., Han, X., Liu, Q., & Ning, Yu. (2015). A credible Bayesian-based trust management scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 11(11), 678926.
Rehman, E., Sher, M., Abbas Naqvi, S. H., Khan, K. B., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017, 1–8.
Wang, T., Zhang, G., Alam Bhuiyan, M. D. Z., Liu, A., Jia, W., & Xie, M. (2018). A novel trust mechanism based on fog computing in sensor–cloud system. Future Generation Computer Systems, 109, 573–582.
Kumar, A., Singh, K., & Khan, T. (2021). L-RTAM: Logarithm based reliable trust assessment model for WBSNs. Journal of Discrete Mathematical Sciences and Cryptography, 24(6), 1701–1716.
Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.
Kumar, A., Singh, K., Khan, T., Ahmadian, A., Saad, M. H. M., & Manjul, M. (2021). ETAS: An efficient trust assessment scheme for BANs. IEEE Access, 9, 83214–83233.
Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605–616.
Fang, W., Zhang, C., Shi, Z., Zhao, Q., & Shan, L. (2016). BTRES: Beta-based trust and reputation evaluation system for wireless sensor networks. Journal of Network and Computer Applications, 59, 88–94.
Thirunarayan, K., Anantharam, P., Henson, C., & Sheth, A. (2014). Comparative trust management with applications: Bayesian approaches emphasis. Future Generation Computer Systems, 31, 182–199.
Song,F., & Zhao, B. (2008). Trust-based LEACH protocol for wireless sensor networks. In 2nd international conference on future generation communication and networking (pp.202–207).
Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22–42.
Shi, Y., & Thomas Hou, Y. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.
Cheikhrouhou, O. (2016). Secure group communication in wireless sensor networks: A survey. Journal of Network and Computer Applications, 61, 115–132.
Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.
Ishmanov, F., Kim, S., & Nam, S. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3), 7040–7061.
Aziz, A., Singh, K., Osamy, W., & Khedr, A. M. (2019). Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. Journal of Network and Computer Applications, 126, 12–28.
Zhang, T., Yan, L., & Yang, Y. (2018). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks, 24(3), 777–797.
Meng, W., Li, W., Chunhua, S., Zhou, J., & Rongxing, L. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, 7234–7243.
Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for Ad-Hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379.
Min, J., Kim, J., & Kwon, Y. (2012). Data compression technique for wireless sensor networks. In International conference on hybrid information technology (pp. 9–16). Springer.
Chen, S., Liu, J., Wang, K., & Meng, Wu. (2019). A hierarchical adaptive spatio-temporal data compression scheme for wireless sensor networks. Wireless Networks, 25(1), 429–438.
Jancy, S., & Jayakumar, C. (2019). Sequence statistical code based data compression algorithm for wireless sensor network. Wireless Personal Communications, 106(3), 971–985.
Whitby, A., Jøang, A., & Indulska, J. (2004). Filtering out unfair ratings in bayesian reputation systems. In The autonomous agents and multi-agent systems, New York.
Aziz, A., Singh, K., Osamy, W., & Khedr, A. (2019). Optimizing compressive sensing matrix using chicken swarm optimizationalgorithm. IET Wireless Sensor Systems, 9, 306–312.
Aziz, A., & Singh, K. (2017). Adaptive compressive sensing based routing algorithm for internet of things and wireless sensor networks. In Communication and computing systems: Proceedings of the international conference on communication and computing systems (ICCCS 2016), Gurgaon, India, 9–11 September 2016 (p. 395). CRC Press.
Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Comm., 11(6), 38–43.
Xiong, J., Zhao, J., & Chen, L. (2013). Efficient data gathering in wireless sensor networks based on matrix completion and compressive sensing. arXiv:1302.2244
Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In 2007 international conference on wireless communications, networking and mobile computing (pp. 2684–2687). IEEE.
Acknowledgements
This work was carried out in Secure and Computing laboratory, SC&SS, JNU, New Delhi, India and sponsored by the project entitled “Development of Intelligent Device for Security Enhancement (iEYE)” with sanction order: DST/TDT/DDP12/2017-G.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Khan, T., Singh, K. RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNs. Wireless Pers Commun 129, 953–991 (2023). https://doi.org/10.1007/s11277-022-10165-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10165-7