Trust management system in wireless sensor networks: design considerations and research challenges

Trust is an important factor in wireless sensor networks WSNs in terms of security enhancement and successful collaboration. Trust management TM can ensure that all communicating nodes are trustworthy during authentication, authorisation, or key management, which makes traditional security services more robust and reliable. Moreover, by helping to find reliable nodes, TM improves cooperation among nodes, which is vital for improvement of system performance. Trust estimations and management are highly challenging issues because of the unique features and susceptibility of WSNs to different attacks. These factors prevent direct application of schemes suited to other networks and require careful design in a TM system. Hence, our objective is to discuss and present the concept and design factors of TM in WSNs in detail. Moreover, we explore the current state of research as well as open research issues by reviewing proposed trust computation and management schemes in WSNs. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Hyunsoo Yoon,et al.  Trust-based secure aggregation in wireless sensor networks , 2005 .

[3]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[4]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[5]  Nael B. Abu-Ghazaleh,et al.  Location verification and trust management for resilient geographic routing , 2007, J. Parallel Distributed Comput..

[6]  Raouf Boutaba,et al.  Robust and scalable trust management for collaborative intrusion detection , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.

[7]  Elfed Lewis,et al.  A comparative review of wireless sensor network mote technologies , 2009, 2009 IEEE Sensors.

[8]  Yan Sun,et al.  Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[9]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[10]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[11]  S. Shankar Sastry,et al.  Time synchronization attacks in sensor networks , 2005, SASN '05.

[12]  Jayashree D. Mallapur,et al.  Trust Based Secured Routing in Wireless Multimedia Sensor Networks , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.

[13]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[14]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[15]  Jean-Marc Seigneur,et al.  Collaborative Computer Security and Trust Management , 2009 .

[16]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[17]  Subhash Challa,et al.  GTRSSN: Gaussian Trust and Reputation System for Sensor Networks , 2008, SCSS.

[18]  Sanjay Kumar Madria,et al.  A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network , 2011, 2011 International Conference on Parallel Processing.

[19]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[20]  Liang Ding,et al.  Trust Evaluation Sensing for Wireless Sensor Networks , 2011, IEEE Transactions on Instrumentation and Measurement.

[21]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[22]  İnan Güler,et al.  A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .

[23]  Young-Koo Lee,et al.  An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks , 2010, J. Networks.

[24]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[25]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[26]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[27]  Stefanos Gritzalis,et al.  Trust Establishment in Ad Hoc and Sensor Networks , 2006, CRITIS.

[28]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[29]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[30]  L. S. Ng,et al.  Expert security system in wireless sensor networks based on fuzzy discussion multi-agent systems , 2010 .

[31]  Raouf Boutaba,et al.  Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks , 2011, IEEE Transactions on Network and Service Management.

[32]  Hongjun Dai,et al.  Trust Evaluation and Dynamic Routing Decision Based on Fuzzy Theory for MANETs , 2009, J. Softw..

[33]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[34]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[35]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[36]  R. Subramanian Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions , 2008 .

[37]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[38]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[39]  Yoonmee Doh,et al.  PLUS: parameterised localised trust management-based security framework for sensor networks , 2008, Int. J. Sens. Networks.

[40]  Shukor Abd Razak,et al.  Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..

[41]  Sudip Misra,et al.  Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..

[42]  Baoxian Zhang,et al.  Recent Advances in Wireless Communications and Networking , 2011, Mob. Networks Appl..

[43]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[44]  Hyunsoo Yoon,et al.  Trust Management for Resilient Wireless Sensor Networks , 2005, ICISC.

[45]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[46]  Félix Gómez Mármol,et al.  Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[47]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[48]  Jianhua Ma,et al.  Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks , 2010, J. Commun..

[49]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[50]  Stefanos Gritzalis,et al.  Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[51]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[52]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[53]  Xuefeng Zheng,et al.  A Secure Routing Scheme for Static Wireless Sensor Networks , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[54]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[55]  Aamir Saeed Malik,et al.  Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview , 2011, Eur. Trans. Telecommun..

[56]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[57]  Ibrahima Niang,et al.  A Survey of Access Control Schemes in Wireless Sensor Networks , 2011 .

[58]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[59]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[60]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[61]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[62]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[63]  Yang Zhang,et al.  Trust Based Secure Localization in Wireless Sensor Networks , 2011, 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing.

[64]  Raouf Boutaba,et al.  Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection , 2009, 2009 International Conference on Network and Service Security.

[65]  Azzedine Boukerche,et al.  Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427] , 2007, Comput. Commun..

[66]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[67]  Anna Felkner How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .

[68]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[69]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.