A multi-level study of information trust models in WSN-assisted IoT

Abstract The Internet of Things (IoT) comprises heterogeneous and interconnected objects. It tries to provide information anytime, anywhere and for anything. The IoT incorporates a variety of technologies, mainly the Wireless Sensor Networks (WSNs). In such networks, sensors are deployed in an open and unprotected environment. Their role is essentially to supervise the environment and report real life phenomena. Only trusted and accurate data should be exchanged between sensors and transmitted to the fusion node which will take charge of the extraction of reliable information. To reach this purpose, we propose that trust should be established at three levels. In this paper, we provide a survey on recent advances in data perception trust (trust in the raw sensed data), communication trust (trust relationship between sensors) and data fusion trust (trust in the fusion process). Moreover, we investigate the existing research to identify their challenges and to suggest future research prospects.

[1]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[2]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[3]  Athanasios V. Vasilakos,et al.  Hierarchical Data Aggregation Using Compressive Sensing (HDACS) in WSNs , 2015, ACM Trans. Sens. Networks.

[4]  Quanyuan Feng,et al.  RFID technology and its applications in Internet of Things (IoT) , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[5]  Amit Kumar Mishra,et al.  ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .

[6]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[7]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[8]  Luigi Atzori,et al.  Trustworthiness management in the IoT: The importance of the feedback , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

[9]  B. R. Badrinath,et al.  Context-Aware Sensors , 2004, EWSN.

[10]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[11]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[12]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[13]  Suat Özdemir,et al.  Security in internet of things: A survey , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[14]  Sajal K. Das,et al.  A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.

[15]  R. M. Chandrasekaran,et al.  A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[16]  Magdy Bayoumi,et al.  Data Fusion in WSN , 2012 .

[17]  Zibin Zheng,et al.  Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems , 2015, IEEE Transactions on Services Computing.

[18]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[19]  Ioannis Lambadaris,et al.  MeFoRE: QoE based resource estimation at Fog to enhance QoS in IoT , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[20]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[21]  Aamir Saeed Malik,et al.  Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..

[22]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[23]  Daniele Miorandi,et al.  A security-and quality-aware system architecture for Internet of Things , 2014, Information Systems Frontiers.

[24]  Yun Liu,et al.  An Energy-Efficient Reliable Trust-Based Data Aggregation Protocol for Wireless Sensor Networks , 2015 .

[25]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[26]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[27]  Florence Sèdes,et al.  Trust Management in Social Internet of Things: A Survey , 2016, I3E.

[28]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[29]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[30]  Frederik Hermans,et al.  Quality estimation based data fusion in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[31]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[32]  Ricardo Neisse,et al.  DIAT: A Scalable Distributed Architecture for IoT , 2015, IEEE Internet of Things Journal.

[33]  Wolfgang Lehner,et al.  Representing Data Quality in Sensor Data Streaming Environments , 2009, JDIQ.

[34]  Shao Kun,et al.  Normal Distribution Based Dynamical Recommendation Trust Model , 2012 .

[35]  Yun Liu,et al.  Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.

[36]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[37]  Yun Liu,et al.  Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[38]  V. Uma Rani,et al.  Review of Trust Models in Wireless Sensor Networks , 2014 .

[39]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[40]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[41]  Philip S. Yu,et al.  A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.

[42]  Hossam S. Hassanein,et al.  Vehicle as a resource (VaaR) , 2014, IEEE Network.

[43]  A Meena Kowshalya,et al.  Dynamic trust management for secure communications in social internet of things (SIoT) , 2018, Sādhanā.

[44]  Schahram Dustdar,et al.  On the Evaluation of Quality of Context , 2008, EuroSSC.

[45]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[46]  Weisong Shi,et al.  Consistency-driven data quality management of networked sensor systems , 2008, J. Parallel Distributed Comput..

[47]  Fabio A. Schreiber,et al.  Quality- and energy-aware data compression by aggregation in WSN data streams , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[48]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[49]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[50]  Ashraf M. Aziz A new adaptive decentralized soft decision combining rule for distributed sensor systems with data fusion , 2014, Inf. Sci..

[51]  C. Chandrasekar,et al.  Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting , 2010 .

[52]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[53]  Qian Tao,et al.  A novel prediction approach for trustworthy QoS of web services , 2012, Expert Syst. Appl..

[54]  Tharam S. Dillon,et al.  The Fuzzy and Dynamic Nature of Trust , 2005, TrustBus.

[55]  Sundaravalli Narayanaswami,et al.  Mobile adhoc networks: A simulation based security evaluation and intrusion prevention , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[56]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[57]  Xiaojiang Du,et al.  Defending Malicious Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[58]  Chris J. Mitchell,et al.  Security Vulnerabilities in Ad Hoc Networks , 2003 .

[59]  Oumaima Ben Abderrahim,et al.  TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[60]  Yudhvir Singh,et al.  Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2017 .

[61]  Fakhri Karray,et al.  Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.

[62]  Athanasios V. Vasilakos,et al.  Algorithm design for data communications in duty-cycled wireless sensor networks: A survey , 2013, IEEE Communications Magazine.

[63]  Raffaele Cerulli,et al.  Exact and heuristic methods to maximize network lifetime in wireless sensor networks with adjustable sensing ranges , 2012, Eur. J. Oper. Res..

[64]  Antonio Casimiro,et al.  A Survey on Data Quality for Dependable Monitoring in Wireless Sensor Networks , 2017, Sensors.

[65]  Farookh Khadeer Hussain,et al.  Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) , 2018, Mobile Networks and Applications.

[66]  Eduardo F. Nakamura,et al.  Information fusion for wireless sensor networks: Methods, models, and classifications , 2007, CSUR.

[67]  Seyed Alireza Hashemi Golpaygani,et al.  Collusion detection in feedback-based reputation systems via temporal and social analysis , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).

[68]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[69]  C. Cicconetti,et al.  A distributed architecture for discovery and access in the internet of things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[70]  Lei Zhang,et al.  Wireless Sensor Networks and the Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[71]  Yan Lindsay Sun,et al.  Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[72]  Xi Zhang,et al.  Defending collaborative false data injection attacks in wireless sensor networks , 2014, Inf. Sci..

[73]  Naveen K. Chilamkurti,et al.  A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..

[74]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[75]  Vladimir Zadorozhny,et al.  Data Credence in IoT: Vision and Challenges , 2017, Open J. Internet Things.

[76]  Harsh Kupwade Patil,et al.  Wireless Sensor Network Security: The Internet of Things , 2017 .

[77]  Mubashir Husain Rehmani,et al.  Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..

[78]  Mari Carmen Domingo,et al.  An overview of the Internet of Things for people with disabilities , 2012, J. Netw. Comput. Appl..

[79]  Sajal K. Das,et al.  Data Fusion with Desired Reliability in Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[80]  Yaqiong Liu,et al.  An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[81]  Noël Crespi,et al.  Quality of Information as an indicator of Trust in the Internet of Things , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[82]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[83]  Hajar Mousannif,et al.  Data quality in internet of things: A state-of-the-art survey , 2016, J. Netw. Comput. Appl..

[84]  Sudip Misra,et al.  Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.

[85]  Lei Huang,et al.  Behavior-Based Trust in Wireless Sensor Network , 2006, APWeb Workshops.

[86]  Minho Shin,et al.  Challenges in Data Quality Assurance in Pervasive Health Monitoring Systems , 2009 .

[87]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[88]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[89]  Xianzhi Wang,et al.  Trust architecture and reputation evaluation for internet of things , 2018, J. Ambient Intell. Humaniz. Comput..

[90]  Hervé Guyennet,et al.  Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.

[91]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[92]  Abdul Hanan Abdullah,et al.  Security Issues and Attacks in Wireless Sensor Network , 2014 .

[93]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[94]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[95]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[96]  Nima Jafari Navimipour,et al.  Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research , 2017, J. Netw. Comput. Appl..

[97]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[98]  Jordán Pascual Espada,et al.  New Advances in the Internet of Things , 2018 .

[99]  Stefanos Gritzalis,et al.  Hybrid trust and reputation management for sensor networks , 2010, Wirel. Networks.

[100]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[101]  G. Evensen,et al.  Analysis Scheme in the Ensemble Kalman Filter , 1998 .

[102]  Noël Crespi,et al.  The Cluster Between Internet of Things and Social Networks: Review and Research Challenges , 2014, IEEE Internet of Things Journal.

[103]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[104]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[105]  S. Ozdemir,et al.  Functional Reputation Based Data Aggregation for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[106]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[107]  Jörg Daubert,et al.  A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[108]  Yunghsiang Sam Han,et al.  Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks , 2008, IEEE Transactions on Computers.

[109]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[110]  Meejeong Lee,et al.  A Multi-Hop Clustering Mechanism for Scalable IoT Networks , 2018, Sensors.

[111]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[112]  Manoj Misra,et al.  Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[113]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..