A novel multiple-level trust management framework for wireless sensor networks

Abstract The distributed deployment nature of wireless sensor networks (WSNs) poses a challenge to the security of node cooperation in them as it is difficult for WSN to ensure that all nodes can recognise a huge number of other individual nodes and select appropriate and trustworthy nodes for cooperation. Node cooperation may therefore be launched in an unreliable environment and might be vulnerable to attacks. Consequently, the security of nodes is of paramount importance for the proper operation of WSNs. The distributed trust management scheme is a feasible solution. With a view to making improvement on the existing trust management mechanisms, we in this paper propose ML-TRUST, a multiple-level trust management framework for trust management in WSN in which three levels of trust are used to establish trustworthy relationships among nodes for their cooperation, namely, (1) a subjective trust, which is defined as belief and is proposed with respect to three aspects: past judgements, witness evidence, and capacity evaluation; (2) an objective trust, which is defined as reputation and is proposed with two factors, number of functioning communities and weighted judgements by rating nodes’ reputations, being introduced in reputation rating, and with several rules and fraud factor tests being given to prevent reputation rating from malicious attacks, and (3) the recommended trust method, which is proposed to obtain trustable impressions from strange recommendations with, in connection, several consistency factors being presented to determine the trustworthiness of a recommendation. Besides using a set of lemmas and theorems to back up our ML-TRUST framework, we also list the results of a series of simulation tests to further verify the performance of our mechanism.

[1]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[2]  Erman Ayday,et al.  Iterative Trust and Reputation Management Using Belief Propagation , 2012, IEEE Transactions on Dependable and Secure Computing.

[3]  Fuyuki Ishikawa,et al.  Trust Computation in Web Service Compositions Using Bayesian Networks , 2012, 2012 IEEE 19th International Conference on Web Services.

[4]  Xin Xu,et al.  An adaptive recommendation trust model in multiagent system , 2004 .

[5]  Guiran Chang,et al.  Modeling access control for cyber-physical systems using reputation , 2012, Comput. Electr. Eng..

[6]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[7]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[8]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[12]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[13]  Vijay Varadharajan,et al.  Role-based Recommendation and Trust Evaluation , 2007, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007).

[14]  Lei Huang,et al.  Behavior-Based Trust in Wireless Sensor Network , 2006, APWeb Workshops.

[15]  Gerd Kortuem,et al.  Disseminating Trust Information in Wearable Communities , 2000 .

[16]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[17]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[18]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[19]  Audun Jøsang,et al.  Advanced Features in Bayesian Reputation Systems , 2009, TrustBus.

[20]  M. Ufuk Çaglayan,et al.  A Model of Security Information Flow on Entities for Trust Computation , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[21]  Xiaolin Li,et al.  VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks , 2009, ICCCN.

[22]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[23]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[24]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[25]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[26]  V. Vijayakumar,et al.  Trust and Reputation Aware Security for Resource Selection in Grid Computing , 2008, 2008 International Conference on Security Technology.

[27]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[28]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[29]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[30]  Xin Xu,et al.  An adaptive recommendation trust model in multiagent system , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[31]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[32]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[33]  DaeHun Nyang,et al.  Software-Based Remote Code Attestation in Wireless Sensor Network , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[34]  Basit Qureshi,et al.  A distributed reputation and trust management scheme for mobile peer-to-peer networks , 2012, Comput. Commun..

[35]  P. Dewan,et al.  Securing P2P networks using peer reputations: is there a silver bullet? , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.

[36]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .