An agent-based trust and reputation management scheme for wireless sensor networks

The operation of wireless sensor networks (WSNs) is functionally affected by the selfish and/or malicious network nodes; and their resource constraints complicate the design of any WSN-based protocol and application. Rating nodes' trust and reputation have proven to be an effective solution to improve security, to support decision-making and to promote node collaboration in both wired and wireless networks. However, existing approaches to trust and reputation management emphasize mostly on trust and reputation modeling and ignore the overhead problems brought by their proposed schemes. In this paper, taking into consideration the power and bandwidth constraints of WSNs, we propose a novel agent-based trust and reputation management scheme (ATRM) from a system design point of view. Our objective is to manage trust and reputation with minimal overhead in terms of extra messages and time delay. The main contribution of our work is the introduction of a localized trust and reputation management strategy, which reduces both communication cost and acquisition latency.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[4]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[5]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[6]  Muthucumaru Maheswaran,et al.  Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[7]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[8]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[9]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[10]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[11]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[12]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[13]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[14]  Azzedine Boukerche,et al.  A novel solution for achieving anonymity in wireless ad hoc networks , 2004, PE-WASUN '04.

[15]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[16]  Ninghui Li,et al.  RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[17]  J. Feigenbaum,et al.  The KeyNote trust management system version2, IETF RFC 2704 , 1999 .

[18]  Xu Li Secure and anonymous routing in wireless ad-hoc networks , 2005 .