[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
review-article

A multi-level study of information trust models in WSN-assisted IoT

Published: 14 March 2019 Publication History

Abstract

The Internet of Things (IoT) comprises heterogeneous and interconnected objects. It tries to provide information anytime, anywhere and for anything. The IoT incorporates a variety of technologies, mainly the Wireless Sensor Networks (WSNs). In such networks, sensors are deployed in an open and unprotected environment. Their role is essentially to supervise the environment and report real life phenomena. Only trusted and accurate data should be exchanged between sensors and transmitted to the fusion node which will take charge of the extraction of reliable information. To reach this purpose, we propose that trust should be established at three levels. In this paper, we provide a survey on recent advances in data perception trust (trust in the raw sensed data), communication trust (trust relationship between sensors) and data fusion trust (trust in the fusion process). Moreover, we investigate the existing research to identify their challenges and to suggest future research prospects.

References

[1]
F.A. Alaba, M. Othman, I.A.T. Hashem, F. Alotaibi, Internet of things security: a survey, J. Netw. Comput. Appl. (2017).
[2]
M.C. Domingo, An overview of the internet of things for people with disabilities, J. Netw. Comput. Appl. 35 (2) (2012) 584–596.
[3]
J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (IoT): a vision, architectural elements, and future directions, Future Gener. Comput. Syst. 29 (7) (2013) 1645–1660.
[4]
S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, Security, privacy and trust in internet of things: the road ahead, Comput. Netw. 76 (2015) 146–164.
[5]
X. Jia, Q. Feng, T. Fan, Q. Lei, RFID technology and its applications in internet of things (IoT), Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, IEEE, 2012, pp. 1282–1285.
[6]
K. Yang, Wireless sensor networks, Principles, Design and Applications, 2014.
[7]
Y. Jiang, L. Zhang, L. Wang, Wireless sensor networks and the internet of things, Int. J. Distrib. Sens. Netw. 2013 (2013).
[8]
H.K. Patil, T.M. Chen, Wireless sensor network security: the internet of things, Computer and Information Security Handbook, Third Ed., Elsevier, 2017, pp. 317–337.
[9]
B. Rashid, M.H. Rehmani, Applications of wireless sensor networks for urban areas: a survey, J. Netw. Comput. Appl. 60 (2016) 192–219.
[10]
R.R. Yager, J.P. Espada, New Advances in the Internet of Things, Springer, 2018.
[11]
A. Krupa, A secure and advanced data gathering pattern for wireless sensor networks (2016).
[12]
A. Oracevic, S. Dilek, S. Ozdemir, Security in internet of things: a survey, Networks, Computers and Communications (ISNCC), 2017 International Symposium on, IEEE, 2017, pp. 1–6.
[13]
A.-S.K. Pathan, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, CRC press, 2016.
[14]
K. Chelli, Security issues in wireless sensor networks: attacks and countermeasures, Proceedings of the World Congress on Engineering, 1, 2015, pp. 1–3.
[15]
C.R. Davis, A localized trust management scheme for ad hoc networks, Proceedings of the 3rd International Conference on Networking (ICN’04), 2004, pp. 671–675.
[16]
R. Feng, X. Xu, X. Zhou, J. Wan, A trust evaluation algorithm for wireless sensor networks based on node behaviors and DS evidence theory, Sensors 11 (2) (2011) 1345–1360.
[17]
A.-S.K. Pathan, H.-W. Lee, C.S. Hong, Security in wireless sensor networks: issues and challenges, Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, 2, IEEE, 2006, pp. 6–pp.
[18]
Y. Yu, K. Li, W. Zhou, P. Li, Trust mechanisms in wireless sensor networks: attack analysis and countermeasures, J. Netw. Comput. Appl. 35 (3) (2012) 867–880.
[19]
E. Chang, P. Thomson, T. Dillon, F. Hussain, The fuzzy and dynamic nature of trust, International Conference on Trust, Privacy and Security in Digital Business, Springer, 2005, pp. 161–174.
[20]
Z. Yan, P. Zhang, A.V. Vasilakos, A survey on trust management for internet of things, J. Netw. Comput. Appl. 42 (2014) 120–134.
[21]
J.O. Oluoch, A Unified Framework for Trust Management in Vehicular Ad Hoc Networks (VANET), Oakland University, 2015, Ph.D. thesis.
[22]
J. Daubert, A. Wiesmaier, P. Kikiras, A view on privacy & trust in IoT, 2015 IEEE International Conference on Communication Workshop (ICCW), IEEE, 2015, pp. 2665–2670.
[23]
A.S. Neeraj, Internet of things and trust management in IoT–review, 2016.
[24]
V.U. Rani, K.S. Sundaram, Review of trust models in wireless sensor networks, Int. J. Comput. Inf. Syst. Control Eng. 8 (2) (2014).
[25]
S. Sicari, C. Cappiello, F. De Pellegrini, D. Miorandi, A. Coen-Porisini, A security-and quality-aware system architecture for internet of things, Inf. Syst. Front. (2014) 1–13.
[26]
B. Pourghebleh, N.J. Navimipour, Data aggregation mechanisms in the internet of things: a systematic review of the literature and recommendations for future research, J. Netw. Comput. Appl. 97 (2017) 23–34.
[27]
C. Sarkar, A.U.N. SN, R.V. Prasad, A. Rahim, R. Neisse, G. Baldini, DIAT: a scalable distributed architecture for IoT, IEEE Internet Things J. 2 (3) (2015) 230–239.
[28]
G. Tanganelli, E. Mingozzi, C. Vallati, C. Cicconetti, A distributed architecture for discovery and access in the internet of things, Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on, IEEE, 2013, pp. 45–46.
[29]
A. Abdelgawad, M. Bayoumi, Data fusion in WSN, Resource-Aware Data Fusion Algorithms for Wireless Sensor Networks, Springer, 2012, pp. 17–35.
[30]
E.F. Nakamura, A.A. Loureiro, A.C. Frery, Information fusion for wireless sensor networks: methods, models, and classifications, ACM Comput. Surv. 39 (3) (2007) 9.
[31]
W. Li, H. Song, ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks, IEEE Trans. Intell. Transp. Syst. 17 (4) (2016) 960–969.
[32]
P.-W. Yau, C.J. Mitchell, Security vulnerabilities in ad hoc networks, The Seventh International Symposium on Communication Theory and Applications, July 13–18, 2003, Ambleside, Lake District, UK, 2003, pp. 99–104.
[33]
Y. Sun, Z. Han, K.R. Liu, Defense of trust management vulnerabilities in distributed networks, IEEE Commun. Mag. 46 (2) (2008) 112–119.
[34]
D. Martins, H. Guyennet, Wireless sensor network attacks and security mechanisms: a short survey, Network-Based Information Systems (NBiS), 2010 13th International Conference on, IEEE, 2010, pp. 313–320.
[35]
J. Wang, Z. Liu, S. Zhang, X. Zhang, Defending collaborative false data injection attacks in wireless sensor networks, Inf. Sci. 254 (2014) 39–53.
[36]
N. Senthil Ganesh, S. Ranjani, Security Threats on Vehicular Adhoc Networks (VANET): A Review Paper, International Journal of Electronics Communication and Computer Engineering 4 (6) (2013) NCRTCST.
[37]
I. Krontiris, Z. Benenson, T. Giannetsos, F. Freiling, T. Dimitriou, Cooperative intrusion detection in wireless sensor networks, Wirel. Sens. Netw. (2009) 263–278.
[38]
P. Reindl, K. Nygard, X. Du, Defending malicious collision attacks in wireless sensor networks, Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, IEEE, 2010, pp. 771–776.
[39]
R. Malik, H. Sehrawat, Y. Singh, Comprehensive study of selective forwarding attack in wireless sensor networks, Int. J. 8 (5) (2017).
[40]
Y. Chae, L.C. DiPippo, Y.L. Sun, Trust management for defending on-off attacks, IEEE Trans. Parallel Distrib. Syst. 26 (4) (2015) 1178–1191.
[41]
F. Ishmanov, A.S. Malik, S.W. Kim, B. Begalov, Trust management system in wireless sensor networks: design considerations and research challenges, Trans. Emerg. Telecommun. Technol. 26 (2) (2015) 107–130.
[42]
D. He, N. Kumar, N. Chilamkurti, A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Inf. Sci. 321 (2015) 263–277.
[43]
M. Turkanović, B. Brumen, M. Hölbl, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Netw. 20 (2014) 96–112.
[44]
R.W. Anwar, M. Bakhtiari, A. Zainal, A.H. Abdullah, K.N. Qureshi, F. Computing, J. Bahru, Security issues and attacks in wireless sensor network, World Appl. Sci. J. 30 (10) (2014) 1224–1227.
[45]
S. Ghildiyal, A.K. Mishra, A. Gupta, N. Garg, Analysis of denial of service (DoS) attacks in wireless sensor networks, Int. J. Res. Eng. Technol. 3 (2014).
[46]
M.A. Jan, P. Nanda, X. He, R.P. Liu, A sybil attack detection scheme for a forest wildfire monitoring application, Future Gener. Comput. Syst. (2016).
[47]
M. Khanderiya, M. Panchal, A novel approach for detection of sybil attack in wireless sensor networks (2016).
[48]
V. Sujatha, E.M. Anita, Detection of sybil attack in wireless sensor network, Middle-East J. Sci. Res. 23 (2015) 202–206.
[49]
A. Karkouch, H. Mousannif, H. Al Moatassime, T. Noel, Data quality in internet of things: a state-of-the-art survey, J. Netw. Comput. Appl. 73 (2016) 57–81.
[50]
Y. Qin, Q.Z. Sheng, N.J. Falkner, S. Dustdar, H. Wang, A.V. Vasilakos, When things matter: a data-centric view of the internet of things, arXiv:1407.2704 (2014).
[51]
C. Cappiello, F.A. Schreiber, Quality-and energy-aware data compression by aggregation in WSN data streams, Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on, IEEE, 2009, pp. 1–6.
[52]
A. Klein, W. Lehner, Representing data quality in sensor data streaming environments, J. Data Inf. Qual. 1 (2) (2009) 10.
[53]
A. Manzoor, H.-L. Truong, S. Dustdar, On the evaluation of quality of context, European Conference on Smart Sensing and Context, Springer, 2008, pp. 140–153.
[54]
K. Sha, W. Shi, Consistency-driven data quality management of networked sensor systems, J. Parallel Distrib. Comput. 68 (9) (2008) 1207–1221.
[55]
E. Elnahrawy, B. Nath, Context-aware sensors, European Workshop on Wireless Sensor Networks, Springer, 2004, pp. 77–93.
[56]
L.B. Larkey, L.M. Bettencourt, A. Hagberg, In-situ data quality assurance for environmental applications of wireless sensor networks, ACM Trans. Sens. Netw. (2006).
[57]
F. Hermans, N. Dziengel, J. Schiller, Quality estimation based data fusion in wireless sensor networks, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, IEEE, 2009, pp. 1068–1070.
[58]
J. Sriram, M. Shin, D. Kotz, A. Rajan, M. Sastry, M. Yarvis, Challenges in data quality assurance in pervasive health monitoring systems, Future of Trust in Computing, Springer, 2009, pp. 129–142.
[59]
C.C. Agga0rwal, S.Y. Philip, A general survey of privacy-preserving data mining models and algorithms, Privacy-preserving data mining, Springer, 2008, pp. 11–52.
[60]
T. Eder, D. Nachtmann, D. Schreckling, Trust and Reputation in the Internet of Things, Tech. Rep., Universität Passau, 2013.
[61]
J. Chen, Z. Tian, X. Cui, L. Yin, X. Wang, Trust architecture and reputation evaluation for internet of things, J. Ambient Intell. Humaniz. Comput. (2018) 1–9.
[62]
M. Nitti, R. Girau, L. Atzori, V. Pilloni, Trustworthiness management in the IoT: the importance of the feedback, Innovations in Clouds, Internet and Networks (ICIN), 2017 20th Conference on, IEEE, 2017, pp. 325–327.
[63]
Q. Tao, H.-y. Chang, C.-q. Gu, Y. Yi, A novel prediction approach for trustworthy qos of web services, Expert Syst. Appl. 39 (3) (2012) 3676–3681.
[64]
S. Wang, Z. Zheng, Z. Wu, M.R. Lyu, F. Yang, Reputation measurement and malicious feedback rating prevention in web service recommendation systems, IEEE Trans. Serv. Comput. 8 (5) (2015) 755–767.
[65]
S. Abdelhamid, H. Hassanein, G. Takahara, Vehicle as a resource (VAAR), IEEE Netw. 29 (1) (2015) 12–17.
[66]
H. Baqa, N.B. Truong, N. Crespi, G.M. Lee, F. Le Gall, Quality of information as an indicator of trust in the internet of things, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), IEEE, 2018, pp. 204–211.
[67]
V. Zadorozhny, P. Krishnamurthy, M. Abdelhakim, K. Pelechrinis, J. Xu, Data credence in IoT: vision and challenges, Open Journal of Internet of Things (OJIOT), v. 3, N. 1, 114-126, 2017. Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference., 3, 2017, pp. 114–126.
[68]
M. Aazam, M. St-Hilaire, C.-H. Lung, I. Lambadaris, MeFoRE: QoE based resource estimation at Fog to enhance QoS in IoT, Telecommunications (ICT), 2016 23rd International Conference on, IEEE, 2016, pp. 1–5.
[69]
H.S. Moghaddam, S.A.H. Golpaygani, Collusion detection in feedback-based reputation systems via temporal and social analysis, Technology, Communication and Knowledge (ICTCK), 2015 International Congress on, IEEE, 2015, pp. 318–324.
[70]
A. Duggal, M. Misra, R. Srinivasaraghavan, Categorising context and using short term contextual information to obtain long term context, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, IEEE, 2012, pp. 1771–1776.
[71]
G.V. Crosby, N. Pissinou, J. Gadze, A framework for trust-based cluster head election in wireless sensor networks, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, IEEE, 2006, pp. 10–pp.
[72]
A. Srinivasan, J. Teitelbaum, J. Wu, Drbts: distributed reputation-based beacon trust system, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, IEEE, 2006, pp. 277–283.
[73]
E. Aivaloglou, S. Gritzalis, Hybrid trust and reputation management for sensor networks, Wirel. Netw. 16 (5) (2010) 1493–1510.
[74]
B. Yan, Y. Zhang, M. Dong, J. Zhou, Lu, A trust model based on grid for wireless sensor networks, Comput. Inf. Syst. 8 (1) (2012) 405–414.
[75]
M. Nitti, R. Girau, L. Atzori, Trustworthiness management in the social internet of things, IEEE Trans. Knowl. Data Eng. 26 (5) (2014) 1253–1266.
[76]
A. Meena Kowshalya, M.L. Valarmathi, Dynamic trust management for secure communications in social internet of things (SIoT), Sādhanā 43 (9) (2018) 136.
[77]
L. Atzori, A. Iera, G. Morabito, M. Nitti, The social internet of things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization, Comput. Netw. 56 (16) (2012) 3594–3608.
[78]
A.M. Ortiz, D. Hussein, S. Park, S.N. Han, N. Crespi, The cluster between internet of things and social networks: review and research challenges, IEEE Internet Things J. 1 (3) (2014) 206–215.
[79]
R. Chen, F. Bao, J. Guo, Trust-based service management for social internet of things systems, IEEE Trans. Dependable Secure Comput. 13 (6) (2016) 684–696.
[80]
P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, Springer, 2002, pp. 107–121.
[81]
S. Ganeriwal, L.K. Balzano, M.B. Srivastava, Reputation-based framework for high integrity sensor networks, ACM Trans. Sens. Netw. 4 (3) (2004) 15.
[82]
S. Buchegger, J.-Y. Le Boudec, Performance analysis of the confidant protocol, Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM, 2002, pp. 226–236.
[83]
S. Buchegger, J.-Y. Le Boudec, A robust reputation system for peer-to-peer and mobile ad-hoc networks, P2PEcon 2004, LCA-CONF-2004-009, 2004.
[84]
L. Huang, L. Li, Q. Tan, Behavior-based trust in wireless sensor network, Asia-Pacific Web Conference, Springer, 2006, pp. 214–223.
[85]
H. Chen, H. Wu, X. Zhou, C. Gao, Reputation-based trust in wireless sensor networks, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE’07), IEEE, 2007, pp. 603–607.
[86]
V.S. Dhulipala, N. Karthik, R. Chandrasekaran, A novel heuristic approach based trust worthy architecture for wireless sensor networks, Wirel. Pers. Commun. 70 (1) (2013) 189–205.
[87]
J. Jiang, G. Han, F. Wang, L. Shu, M. Guizani, An efficient distributed trust model for wireless sensor networks, IEEE Trans. Parallel Distrib. Syst. 26 (5) (2015) 1228–1237.
[88]
F. Bao, I.-R. Chen, Dynamic trust management for internet of things applications, Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, ACM, 2012, pp. 1–6.
[89]
F. Bao, I.-R. Chen, Trust management for the internet of things and its application to service composition, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012, pp. 1–6.
[90]
O.B. Abderrahim, M.H. Elhdhili, L. Saidane, TMCoI-SIoT: a trust management system based on communities of interest for the social internet of things, Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International, IEEE, 2017, pp. 747–752.
[91]
M. Raya, P. Papadimitratos, V.D. Gligor, J.-P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, IEEE, 2008, pp. 1238–1246.
[92]
M. Chen, Y. Zhou, L. Tang, Ray projection method and its applications based on grey prediction, Chin. J. Stat. Decis 1 (1) (2007) 13–20.
[93]
H.-S. Lim, Y.-S. Moon, E. Bertino, Provenance-based trustworthiness assessment in sensor networks, Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, ACM, 2010, pp. 2–7.
[94]
K. Shao, F. Luo, N.-X. Mei, Z.-T. Liu, Normal distribution based dynamical recommendation trust model, J. Softw. 23 (12) (2012) 3130–3148.
[95]
A. Josang, J. Haller, Dirichlet reputation systems, Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on, IEEE, 2007, pp. 112–119.
[96]
G. Burgers, P. Jan van Leeuwen, G. Evensen, Analysis scheme in the ensemble Kalman filter, Mon. Weather Rev. 126 (6) (1998) 1719–1724.
[97]
M.S. Al Mazrouei, S. Narayanaswami, Mobile adhoc networks: a simulation based security evaluation and intrusion prevention, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, IEEE, 2011, pp. 308–313.
[98]
Y. Cho, G. Qu, Y. Wu, Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks, Security and privacy workshops (SPW), 2012 IEEE Symposium on, IEEE, 2012, pp. 134–141.
[99]
W. Abdelghani, C.A. Zayani, I. Amous, F. Sèdes, Trust management in social internet of things: a survey, Conference on e-Business, e-Services and e-Society, Springer, 2016, pp. 430–441.
[100]
D.E. Kouicem, A. Bouabdallah, H. Lakhlef, Internet of things security: a top-down survey, Comput. Netw. 141 (2018) 199–221.
[101]
M.D. Alshehri, F.K. Hussain, O.K. Hussain, Clustering-driven intelligent trust management methodology for the internet of things (citm-IoT), Mob. Netw. Appl. (2018) 1–13.
[102]
Y. Sung, S. Lee, M. Lee, A multi-hop clustering mechanism for scalable IoT networks, Sensors 18 (4) (2018) 961.
[103]
A.M. Aziz, A new adaptive decentralized soft decision combining rule for distributed sensor systems with data fusion, Inf. Sci. 256 (2014) 197–210.
[104]
B. Khaleghi, A. Khamis, F.O. Karray, S.N. Razavi, Multisensor data fusion: a review of the state-of-the-art, Information Fusion 14 (1) (2013) 28–44.
[105]
H. Luo, H. Tao, H. Ma, S.K. Das, Data fusion with desired reliability in wireless sensor networks, IEEE Trans. Parallel Distrib. Syst. 22 (3) (2011) 501–513.
[106]
X. Xu, R. Ansari, A. Khokhar, A.V. Vasilakos, Hierarchical data aggregation using compressive sensing (HDACS) in WSNS, ACM Trans. Sens. Netw. 11 (3) (2015) 45.
[107]
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, Global Telecommunications Conference, 2003. GLOBECOM’03. IEEE, 3, IEEE, 2003, pp. 1435–1439.
[108]
H.-T. Pai, Y. Han, Power-efficient direct-voting assurance for data fusion in wireless sensor networks, IEEE Trans. Comput. 57 (2) (2008) 261–273.
[109]
M. Umashankar, C. Chandrasekar, Power efficient data fusion assurance scheme for sensor network using silent negative voting, Power 1 (4) (2010).
[110]
I.M. Atakli, H. Hu, Y. Chen, W.S. Ku, Z. Su, Malicious node detection in wireless sensor networks using weighted trust evaluation, Proceedings of the 2008 Spring Simulation Multiconference, Society for Computer Simulation International, 2008, pp. 836–843.
[111]
L. Ju, H. Li, Y. Liu, W. Xue, K. Li, Z. Chi, An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks, Ubiquitous Information Technologies and Applications (CUTE), 2010 Proceedings of the 5th International Conference on, IEEE, 2010, pp. 1–6.
[112]
G.J. Pottie, W.J. Kaiser, Wireless integrated network sensors, Commun. ACM 43 (5) (2000) 51–58.
[113]
W. Zhang, S.K. Das, Y. Liu, A trust based framework for secure data aggregation in wireless sensor networks, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 1, IEEE, 2006, pp. 60–69.
[114]
Y. Sun, H. Luo, S.K. Das, A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks, IEEE Trans. Dependable Secure Comput. 9 (6) (2012) 785–797.
[115]
J.-S. Fu, Y. Liu, Double cluster heads model for secure and accurate data fusion in wireless sensor networks, Sensors 15 (1) (2015) 2021–2040.
[116]
S. Ozdemir, Functional reputation based data aggregation for wireless sensor networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, IEEE, 2008, pp. 592–597.
[117]
C.-x. Liu, Y. Liu, Z.-j. Zhang, Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks, Int. J. Distrib. Sens. Netw. 2013 (2013).
[118]
T. Ma, Y. Liu, Z.-j. Zhang, An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks, Int. J. Control Autom. 8 (3) (2015) 305–318.
[119]
T.M. Cover, J.A. Thomas, Elements of Information Theory, John Wiley & Sons, 2012.
[120]
R. Cerulli, R. De Donato, A. Raiconi, Exact and heuristic methods to maximize network lifetime in wireless sensor networks with adjustable sensing ranges, Eur. J. Oper. Res. 220 (1) (2012) 58–66.
[121]
K. Han, J. Luo, Y. Liu, A.V. Vasilakos, Algorithm design for data communications in duty-cycled wireless sensor networks: a survey, IEEE Commun. Mag. 51 (7) (2013) 107–113.
[122]
A. Jøsang, R. Ismail, C. Boyd, A survey of trust and reputation systems for online service provision, Decis. Support Syst. 43 (2) (2007) 618–644.
[123]
S. Sarkar, S. Chatterjee, S. Misra, Assessment of the suitability of fog computing in the context of internet of things, IEEE Trans. Cloud Comput. 6 (1) (2018) 46–59.
[124]
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM, 2012, pp. 13–16.
[125]
L.M. Vaquero, L. Rodero-Merino, Finding your way in the fog: towards a comprehensive definition of fog computing, ACM SIGCOMM Comput. Commun. Rev. 44 (5) (2014) 27–32.
[126]
G. Jesus, A. Casimiro, A. Oliveira, A survey on data quality for dependable monitoring in wireless sensor networks, Sensors 17 (9) (2017) 2010.

Cited By

View all
  • (2024)Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of thingsJournal of Network and Computer Applications10.1016/j.jnca.2024.103872226:COnline publication date: 1-Jun-2024
  • (2024)An Energy Efficient IPv6 Packet Delivery Outline for Industrial IoT Over G.9959 Protocol Based Wireless Sensor Network (WSN)SN Computer Science10.1007/s42979-024-03195-45:7Online publication date: 23-Aug-2024
  • (2024)A study of mechanisms and approaches for IoV trust models requirements achievementThe Journal of Supercomputing10.1007/s11227-023-05620-680:3(4157-4201)Online publication date: 1-Feb-2024
  • Show More Cited By

Index Terms

  1. A multi-level study of information trust models in WSN-assisted IoT
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
          Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 151, Issue C
          Mar 2019
          260 pages

          Publisher

          Elsevier North-Holland, Inc.

          United States

          Publication History

          Published: 14 March 2019

          Author Tags

          1. Internet of Things
          2. Wireless Sensor Networks
          3. Data perception trust
          4. Communication trust
          5. Data fusion trust
          6. Security

          Qualifiers

          • Review-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 17 Dec 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of thingsJournal of Network and Computer Applications10.1016/j.jnca.2024.103872226:COnline publication date: 1-Jun-2024
          • (2024)An Energy Efficient IPv6 Packet Delivery Outline for Industrial IoT Over G.9959 Protocol Based Wireless Sensor Network (WSN)SN Computer Science10.1007/s42979-024-03195-45:7Online publication date: 23-Aug-2024
          • (2024)A study of mechanisms and approaches for IoV trust models requirements achievementThe Journal of Supercomputing10.1007/s11227-023-05620-680:3(4157-4201)Online publication date: 1-Feb-2024
          • (2023)Data fusion method for wireless sensor network based on machine learningJournal of Computational Methods in Sciences and Engineering10.3233/JCM-22644723:1(361-373)Online publication date: 1-Jan-2023
          • (2023)Improved range-free localization algorithm based on reliable node optimization and enhanced sand cat optimization algorithmThe Journal of Supercomputing10.1007/s11227-023-05436-479:18(20289-20323)Online publication date: 1-Dec-2023
          • (2022)A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of ThingsACM Transactions on Management Information Systems10.1145/347624813:3(1-30)Online publication date: 13-Apr-2022

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media