[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

An Efficient Distributed Trust Model for Wireless Sensor Networks

Published: 01 May 2015 Publication History

Abstract

Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes communication behavior into account to calculate sensor nodes' trust value, which is not enough for trust evaluation due to the widespread malicious attacks. In this paper, we propose an Efficient Distributed Trust Model (EDTM) for WSNs. First, according to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated. Then, communication trust, energy trust and data trust are considered during the calculation of direct trust. Furthermore, trust reliability and familiarity are defined to improve the accuracy of recommendation trust. The proposed EDTM can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively. Simulation results show that EDTM outperforms other similar models, e.g., NBBTE trust model.

References

[1]
H. Chan, and A Perrig, “Security and privacy in sensor networks ”, Comput., vol. 36, no. 10, pp. 103–105, Oct. 2003.
[2]
Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, “Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks”, IEEE J. Sel. Areas Commun., vol. 24, no. 7, pp. 400 –411, May 2009.
[3]
V. C. Gungor, L. Bin, and G. P. Hancke, “Opportunities and challenges of wireless sensor networks in smart grid”, IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557 –3564, Oct. 2010.
[4]
G. Han, J. Jiang, L. Shu, J. Niu, and H. C. Chao, “Managements and applications of trust in wireless sensor networks: A Survey”, J. Comput. Syst. Sci., vol. 80, no. 3, pp. 602– 617, 2014.
[5]
S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks”, Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 66– 77.
[6]
Z. Yao, D. Kim, and Y. Doh, “PLUS: Parameterized and localized trust management scheme for sensor networks security”, Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008, pp. 437– 446.
[7]
R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory”, Sensors, vol. 11, pp. 1345–1360, 2011.
[8]
G. Han, Y. Dong, H. Guo, L. Shu, and D. Wu, “Cross-layer optimized routing in WSN with duty-cycle and energy harvesting”, Wireless Commun. Mobile Comput.3 Feb. 2014.
[9]
G. Han, X. Xu, J. Jiang, L. Shu, and N. Chilamkurti, “The insights of localization through mobile anchor nodes in wireless sensor networks with irregular radio”, KSII Trans. Internet Inf. Syst., vol. 6, pp. 2992–3007, 2012.
[10]
K. Govindan, and P. Mohapatra, “Trust computations and trust dynamics in mobile ad hoc networks: A survey”, IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 279 –298, 2nd Quarter 2012.
[11]
K. Nordheimer, T. Schulze, and D. Veit, “Trustworthiness in networks: A simulation approach for approximating local trust and distrust values”, IEEE Commun. Surveys Tuts., vol. 321, pp. 157–171, 2010.
[12]
A. Josang, “An algebra for assessing trust in certification chains”, Proc. Netw. Distrib. Syst. Security Symp., 1999, pp. 1–10.
[13]
W. Gao, G. Zhang, W. Chen, and Y. Li, “A trust model based on subjective logic ”, Proc. 4th Int. Conf. Internet Comput. Sci. Eng., 2009, pp. 272– 276.
[14]
M. Chen, Y. Zhou, and L, Tang, “Ray projection method and its applications based on Grey Prediction”, Chinese J. Statist. Decision, vol. 1, pp. 13–, 2007.
[15]
H. S. Lim, Y. S. Moon, and E. Bertino, “Provenance based trustworthiness assessment in sensor networks”, Proc. 7th Int. Workshop Data Manage. Sens. Netw., 2010, pp. 2– 7.
[16]
E. Elnahrawy, and B. Nath, “Cleaning and querying noisy sensors ”, Proc. 2nd ACM Int. Conf. Wireless Sens. Netw. Appl., 2003, pp. 78– 87.
[17]
M. Rabbat, and R. Nowak, “Distributed optimization in sensor network ”, Proc. 3rd Int. Symp. Inf. Process. Sens. Netw., 2004, pp. 20– 27.
[18]
K. Shao, F. Luo, N. Mei, and Z. Liu, “Normal distribution based dynamical recommendation trust model”, J. Softw., vol. 23, no. 12, pp. 3130– 3148, 2012.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Parallel and Distributed Systems  Volume 26, Issue 5
May 2015
291 pages

Publisher

IEEE Press

Publication History

Published: 01 May 2015

Author Tags

  1. energy efficient
  2. Wireless sensors networks
  3. distributed trust model

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Event-based data authenticity analytics for IoT and blockchain-enabled ESG disclosureComputers and Industrial Engineering10.1016/j.cie.2024.109992190:COnline publication date: 9-Jul-2024
  • (2024)A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNsAd Hoc Networks10.1016/j.adhoc.2024.103477158:COnline publication date: 1-May-2024
  • (2024)PathGuard: Trustworthy Routing for Sustainable and Secure IoT-WSN NetworksWireless Personal Communications: An International Journal10.1007/s11277-024-11289-8136:1(469-487)Online publication date: 1-May-2024
  • (2024)An adaptive trust system for misbehavior detection in wireless sensor networksWireless Networks10.1007/s11276-024-03687-430:4(2589-2615)Online publication date: 1-May-2024
  • (2023)A comprehensive review on trust management approaches in fog computingJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23289245:6(11397-11423)Online publication date: 1-Jan-2023
  • (2023)A Federated Deep Reinforcement Learning-Based Trust Model in Underwater Acoustic Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2023.330182523:5(5150-5161)Online publication date: 4-Aug-2023
  • (2023)A recommendation management defense mechanism based on trust model in underwater acoustic sensor networksFuture Generation Computer Systems10.1016/j.future.2023.03.043145:C(466-477)Online publication date: 1-Aug-2023
  • (2023)BEASTFuture Generation Computer Systems10.1016/j.future.2023.02.003144:C(165-178)Online publication date: 1-Jul-2023
  • (2023)A survey on opportunistic routing protocols in the Internet of Underwater ThingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.109658225:COnline publication date: 1-Apr-2023
  • (2023)A node trust evaluation method of vehicle-road-cloud collaborative system based on federated learningAd Hoc Networks10.1016/j.adhoc.2022.103013138:COnline publication date: 1-Jan-2023
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media