Management and applications of trust in Wireless Sensor Networks: A survey

Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.

[1]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[2]  Chun-Shien Lu,et al.  Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[3]  Chin-Feng Lai,et al.  Detection of Cognitive Injured Body Region Using Multiple Triaxial Accelerometers for Elderly Falling , 2011, IEEE Sensors Journal.

[4]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[5]  Qi Shi,et al.  An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks , 2009, 2009 International Conference on Network and Service Security.

[6]  Cheng Zhu,et al.  A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks , 2008, 2008 Fifth IEEE International Symposium on Embedded Computing.

[7]  Nathan Lewis,et al.  An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[8]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[9]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[10]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[11]  Weisong Shi,et al.  Building a Trust-Aware dynamic routing solution for Wireless Sensor Networks , 2010, 2010 IEEE Globecom Workshops.

[12]  Nael B. Abu-Ghazaleh,et al.  Location verification and trust management for resilient geographic routing , 2007, J. Parallel Distributed Comput..

[13]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[14]  Guangjie Han,et al.  A reliable sensor selection algorithm for wireless sensor networks , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[15]  Maryline Laurent-Maknavicius,et al.  SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks , 2007, MSN.

[16]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[17]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[18]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[19]  Andreas Matheus,et al.  Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation , 2011, 2011 IEEE SENSORS Proceedings.

[20]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[21]  Ihab A. Ali,et al.  A novel Trust-Based Cross-Layer Model for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).

[22]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[23]  Guangjie Han,et al.  A Novel Sensor Node Selection Method Based on Trust for Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  Liusheng Huang,et al.  A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[25]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[26]  Annett Laube,et al.  Trustworthiness Assessment of Wireless Sensor Data for Business Applications , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[27]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[28]  Jong Hyuk Park,et al.  Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors , 2010, IEEE Intelligent Systems.

[29]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[30]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[31]  Chen Hao,et al.  A Wireless Sensor Networks Based on Multi-angle Trust of Node , 2009, 2009 International Forum on Information Technology and Applications.

[32]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[33]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[34]  Xingming Sun,et al.  Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[35]  Zhigang Chen,et al.  A Routing Algorithm Based on Trustworthy Core Tree for WSN , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[36]  Baohua Zhao,et al.  Trust-Based LEACH Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[37]  Jing Chen,et al.  A Trust Model Based on Bayes Theorem in WSNs , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[38]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[39]  Huafeng Wu,et al.  Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[40]  Ni Yang,et al.  The research of dynamic data fusion based-on node behavior trust for WSNs , 2010, 2010 International Conference On Computer Design and Applications.

[41]  Jong Hyuk Park,et al.  Adaptive Body Posture Analysis Using Collaborative Multi-Sensors for Elderly Falling Detection , 2010 .

[42]  Wei Wang,et al.  A Trust Establishment Scheme for Cluster-Based Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[43]  Haiguang Chen,et al.  Task-based Trust Management for Wireless Sensor Networks , 2009 .

[44]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[45]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[46]  Yang Zhang,et al.  Trust Based Secure Localization in Wireless Sensor Networks , 2011, 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing.

[47]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[48]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[49]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[50]  Huafeng Wu,et al.  Reputation and Trust Mathematical Approach for Wireless Sensor Networks , 2007 .

[51]  Sanjay Kumar Madria,et al.  A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network , 2011, 2011 International Conference on Parallel Processing.

[52]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[53]  Zenon Chaczko,et al.  T-SNIPER: Trust-Aware Sensor Network Information Protocol for Efficient Routing , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[54]  Jerzy Konorski,et al.  Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[55]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.