A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network

Abstract Trust is being deployed along side with cryptography in WSN to achieve better security. This paper describes about how the various systems that are designed to act against attacks with various resource constraints. The design of the security tools for the WSN has to take its vulnerabilities and nature of the technology into consideration thus making them special. In this survey paper, a detailed study about the various methods that apply trust and reputation as their security measure and the attacks that they face are given.

[1]  Sajal K. Das,et al.  A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[2]  Theodore B. Zahariadis,et al.  Mobile Networks Trust management in wireless sensor networks , 2010, Eur. Trans. Telecommun..

[3]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[4]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[7]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[8]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[9]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[10]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[11]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[12]  S. Quartz,et al.  Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.

[13]  Bharat K. Bhargava,et al.  A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..

[14]  Ling Wei,et al.  A Trust Model Based on Bayesian Approach , 2005, AWIC.

[15]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[16]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[17]  Fei Hu,et al.  Secure Wireless Sensor Networks: Problems and Solutions , 2003 .

[18]  Kalpana Sharma,et al.  Cross Layer Security Framework for Wireless Sensor Networks , 2011 .

[19]  Rodrigo Roman,et al.  Featuring trust and reputation management systems for constrained hardware devices , 2007, AUTONOMICS 2007.

[20]  Subhash Challa,et al.  Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.

[21]  Arnab Raha,et al.  A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP) , 2011, Wirel. Sens. Netw..

[22]  K. Komathy,et al.  Trust-based evolutionary game model assisting AODV routing against selfishness , 2008, J. Netw. Comput. Appl..

[23]  Jianping Pan,et al.  Topology control for wireless sensor networks , 2003, MobiCom '03.

[24]  Weisong Shi,et al.  SensorTrust: A resilient trust model for wireless sensing systems , 2011, Pervasive Mob. Comput..

[25]  Mohamed Eltoweissy,et al.  μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[26]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[27]  Zahra Taghikhaki,et al.  Energy-efficient Trust-based aggregation in wireless sensor networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[28]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .

[29]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[30]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[31]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[32]  Hong Luo,et al.  Entropy-Based Trust Management for Data Collection in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[33]  Vladimiro Sassone,et al.  A Bayesian Model for Event-based Trust , 2022 .

[34]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[35]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[36]  Rodrigo Roman,et al.  A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[37]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[38]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[39]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[40]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[41]  Sudip Misra,et al.  Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..

[42]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[43]  Quan Zhou,et al.  Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks , 2009, 2009 First International Conference on Information Science and Engineering.

[44]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[45]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[46]  Juan Manuel González Nieto,et al.  Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.

[47]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[48]  Dai Hongjun,et al.  An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, ICESS.

[49]  Sudip Misra,et al.  Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.