Modified reputation-base trust (MRT) for WSN security

During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but this addresses only a part of the security problem without consideration for high energy consumption. Monitoring behavior of node neighbors using reputation and trust models improves the security of WSNs and maximizes the lifetime for it. However, a few of previous studies take into consideration security threats and energy consumption at the same time. Under these issues we propose a reputation and trust mechanism optimized for security strength. We apply two security threats (oscillating and collusion) during simulations of the proposed model in order to measure the accuracy, scalability, trustworthiness and energy consumption. As results, effects of collusion and oscillating are minimized and energy consumptions for dynamic networks reduced. Also simulation results show that the proposed model remains resilient to low or high percentages of pernicious servers when the percentage of client sensors are greater than or equal 60%. This result is quite promising; it shows that energy consumption generally is low, especially for dynamic networks.

[1]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[2]  John K Kruschke,et al.  Bayesian data analysis. , 2010, Wiley interdisciplinary reviews. Cognitive science.

[3]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[4]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[5]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[6]  Kai Hwang,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jayashree D. Mallapur,et al.  Trust Based Secured Routing in Wireless Multimedia Sensor Networks , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.

[8]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[9]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Teddy Mantoro,et al.  Improving the Lifetime of Wireless Sensor Networks Based on Routing Power Factors , 2012, NDT.

[12]  Roberto Uribeetxeberria,et al.  Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.

[13]  Yan Lindsay Sun,et al.  Trust Establishment in Distributed Networks: Analysis and Modeling , 2007, 2007 IEEE International Conference on Communications.

[14]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[15]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[16]  Krzysztof Socha,et al.  Ant Colony Optimization and Swarm Intelligence , 2004, Lecture Notes in Computer Science.

[17]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .

[18]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[19]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[20]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[21]  B. Karthik,et al.  Improving Network Life Time using Static Cluster Routing for Wireless Sensor Networks , 2013 .

[22]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[23]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[24]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[25]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[26]  Seamus Moloney Simulation of a distributed recommendation system for pervasive networks , 2005, SAC '05.

[27]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[28]  Félix Gómez Mármol,et al.  LFTM, linguistic fuzzy trust mechanism for distributed networks , 2012, Concurr. Comput. Pract. Exp..