Mobile Networks Trust management in wireless sensor networks

SUMMARY The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node’s trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd.

[1]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[2]  Huanguo Zhang,et al.  A Trust Chain Build Scheme for Enhancing Wireless Network Security , 2007 .

[3]  N. Foukia,et al.  Using Trust in Key Distribution in Wireless Sensor Networks , 2007, 2007 IEEE Globecom Workshops.

[4]  D. Meintanis,et al.  On the Power Consumption of Security Algorithms Employed in Wireless Networks , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[5]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[6]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[7]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[8]  Haiguang Chen,et al.  Task-based Trust Management for Wireless Sensor Networks , 2009 .

[9]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[10]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[11]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  P. Georgiadis,et al.  Performance evaluation of a self-evolving trust building framework , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[14]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Ismat K. Maarouf,et al.  WSNodeRater - An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNs , 2007, 2007 IEEE/ACS International Conference on Computer Systems and Applications.

[16]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[17]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[18]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[19]  Mohamed Eltoweissy,et al.  TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[20]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[21]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[22]  K. Kang,et al.  Towards Resilient Geographic Routing in Wireless Sensor Networks , 2006 .

[23]  Nathan Lewis,et al.  Using trust for key distribution and route selection in Wireless Sensor Networks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[24]  Yu-Kwong Kwok,et al.  A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[25]  Theodore B. Zahariadis,et al.  A novel flexible trust management system for heterogeneous wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[26]  Mukesh Singhal,et al.  A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[27]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[28]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[29]  Wendy J. Myrvold,et al.  Generic Reliability Trust Model , 2005, PST.