Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks

The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to identify malicious, selfish and compromised nodes. It supports the decision making processes in wireless sensor networks such as pre key-distribution, data aggregation, sink node selection and self reconfiguration of sensor nodes. This paper discussed the general structure, design issues, trust metrics and the corresponding attacks and defense mechanisms of trust model. It also discusses various trust models used in decision making process of Wireless Sensor Networks.

[1]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[2]  Chris McDonald,et al.  Trusted Greedy Perimeter Stateless Routing , 2007, 2007 15th IEEE International Conference on Networks.

[3]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[4]  Saurabh Singh,et al.  Security For Wireless Sensor Network , 2011 .

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  Vijay Varadharajan,et al.  A trust management architecture for hierarchical wireless sensor networks , 2010, IEEE Local Computer Network Conference.

[7]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[8]  G. Edwin Prem Kumar,et al.  A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network , 2012 .

[9]  Theodore B. Zahariadis,et al.  Mobile Networks Trust management in wireless sensor networks , 2010, Eur. Trans. Telecommun..

[10]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[11]  Sudip Misra,et al.  Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Mohammad S. Obaidat,et al.  An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.

[14]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[15]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[16]  Félix Gómez Mármol,et al.  Trust and Reputation Models Comparison , 2011, Internet Res..

[17]  Li Lin,et al.  QGrid: An Adaptive Trust Aware Resource Management Framework , 2009, IEEE Syst. J..

[18]  Makhlouf Aliouat,et al.  RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks , 2011, J. Univers. Comput. Sci..

[19]  Xiao De Reputation Formal Model for Wireless Sensor Network , 2007 .

[20]  Ling Liu,et al.  Trust and Reputation Management , 2010, IEEE Internet Comput..

[21]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[22]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[23]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[24]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[25]  Mrudang Mehta,et al.  Security in Wireless Sensor Network: A survey , 2011 .

[26]  Anna Felkner How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .

[27]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[28]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[29]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[30]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[31]  Subhash Challa,et al.  Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.

[32]  Suat Özdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008, Comput. Commun..

[33]  Weisong Shi,et al.  SensorTrust: A resilient trust model for wireless sensing systems , 2011, Pervasive Mob. Comput..

[34]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[35]  Arnab Raha,et al.  A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP) , 2011, Wirel. Sens. Netw..

[36]  Nael B. Abu-Ghazaleh,et al.  Location verification and trust management for resilient geographic routing , 2007, J. Parallel Distributed Comput..

[37]  Devanand,et al.  A Trust-Based Secure Data Aggregation Protocol for Wireless Sensor Networks , 2010 .

[38]  Younghun Chae Redeemable reputation based secure routing protocol for wireless sensor networks , 2012 .

[39]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[40]  RomanRodrigo,et al.  Trust management systems for wireless sensor networks , 2010 .

[41]  Yazeed Alkhurayyif,et al.  Security in Wireless Sensor Network , 2013 .

[42]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[43]  Haiguang Chen,et al.  RASN: Resist on-off Attack for Wireless Sensor Networks , 2012 .

[44]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[45]  Lixiang Liu,et al.  Extended Watchdog Mechanism for Wireless Sensor Networks , 2008 .

[46]  Vijay Varadharajan,et al.  A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[47]  Wang Jin,et al.  Research on Trust Model of Sensor Nodes in WSNs , 2012 .

[48]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.