Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor

Most of the existing trust evaluation methods of wireless sensor networks focus on communication behaviors in building paths without considering transmission behaviors in sensing environment. Therefore, a potential threat tothe network security exists in wireless sensor networks. Wepropose a dynamic trust evaluation method based on multi-factor including direct trust factor and indirect trust factor in this paper. Firstly, direct trust factor is composed of communication trust factor and transmission trust factor, both of which can be got from observing the interaction process. Secondly, indirect trust factorcomes from other nodes' recommendations, which are classified into certainand uncertain ones. Such two kinds of recommendation trust values are computed respectively. Finally, nodes' trustworthinessis measured by combining direct trust with indirect trust dynamically. Besides, both the involved classification standard and dynamic weight assignment are dependent on the interaction times between nodes, which are put forward under the background of Hoeffding's Inequality in Probability Theory. Experiments on NS-2 platform show that the proposed method is effective in increasing the network throughput and the network packet delivery ratio.

[1]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[3]  Xu Huang,et al.  A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[5]  Low Tang Jung,et al.  Hybrid scheme for trust management in pervasive computing , 2012, 2012 International Conference on Information Retrieval & Knowledge Management.

[6]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[7]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[8]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[9]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[10]  Weisong Shi,et al.  Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.

[11]  Kamlesh Gupta,et al.  Security issues in wireless sensor networks , 2010 .

[12]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[13]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[14]  Anastasios A. Economides,et al.  Wireless sensor network security visualization , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.

[15]  Zhiping Jia,et al.  A Subjective Trust Management Model Based on AHP for MANETs , 2011, 2011 International Conference on Network Computing and Information Security.

[16]  Ali Farrokhtala,et al.  Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[17]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[18]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[19]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[20]  M. Salem An Efficient Distributed Trust Model for Wireless Sensor Networks , 2016 .

[21]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[22]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[23]  Fangmin Sun,et al.  A Review of Attacks and Security Protocols for Wireless Sensor Networks , 2014, J. Networks.

[24]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[25]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[26]  Joan Feigenbaum,et al.  KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .

[27]  Tian Chun A Novel Super-Peer Based Trust Model for Peer-to-Peer Networks , 2010 .

[28]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).