The double-edged sword: Revealing the critical role of structural hole in forming trust for securing Wireless sensor networks

Security issues for Wireless sensor network (WSN) is always crucial due to its nature. The limitation of computing resources and distributed properties in WSN makes the traditional security mechanisms no longer as feasible in protecting WSN as in wired networks. There is an emerging research area to discover the alternative solutions on trust and reputation mechanisms for WSNs nowadays. The recent studies on trust are mainly focusing on trust modeling so as to effectively detect and avoid malicious activities in the network. To be able to avoid the attacks, the existence of at least an alternative route in the network is required. In this paper, we introduced the new angle of adaptive network to study the interplay between network entities' trust evaluation and its underlie topological connectivity. Inspired from the trust studies in sociology, we found the structural hole has high efficiency in connecting different unconnected networks. But in the security side of view, it is also making the network fragile. These have been confirmed by extensive simulation studies.

[1]  J. Martín-Hernández Measuring Robustness of Complex Networks , 2013 .

[2]  H. T. Mouftah,et al.  The internet of things [Guest Editorial] , 2011, IEEE Commun. Mag..

[3]  J. H. Davis,et al.  An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .

[4]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[5]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[6]  R. Burt The Network Structure Of Social Capital , 2000 .

[7]  Richard A. Watson,et al.  The web as an adaptive network: coevolution of web behavior and web structure , 2011, WebSci '11.

[8]  Adnan Al-Anbuky,et al.  An Authenticated Key Agreement Scheme for Wireless Sensor Networks , 2014, J. Sens. Actuator Networks.

[9]  Lingfeng Wang,et al.  Trust System Design Optimization in Smart Grid Network Infrastructure , 2013, IEEE Transactions on Smart Grid.

[10]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[11]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[12]  Steven B. Andrews,et al.  Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.

[13]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[14]  Lin Chuang,et al.  Quantitative Analysis of Trust Evidence in Internet , 2006, 2006 International Conference on Communication Technology.

[15]  N.J. Davis,et al.  Toward a decentralized trust-based access control system for dynamic collaboration , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[16]  Zhiping Jia,et al.  A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[17]  Robert E. Kooij,et al.  Graph measures and network robustness , 2013, ArXiv.

[18]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[19]  Jingsha He,et al.  Reputation-based Trust Update in Network Environment , 2008, 2008 International Symposium on Electronic Commerce and Security.

[20]  William Liu,et al.  Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[21]  Michel Riguidel,et al.  Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[22]  Bin Mu,et al.  A method for evaluating initial trust value of direct trust and recommender trust , 2010, 2010 International Conference On Computer Design and Applications.

[23]  Caterina M. Scoglio,et al.  Optimizing algebraic connectivity by edge rewiring , 2013, Appl. Math. Comput..

[24]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[25]  Thilo Gross,et al.  Adaptive Networks: Theory, Models and Applications , 2009 .

[26]  Vito Latora,et al.  Social Cohesion, Structural Holes, and a Tale of Two Measures , 2012, ArXiv.

[27]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .