Dishonest recommendation attacks in wireless sensor networks: A survey

Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.

[1]  Huafeng Wu,et al.  Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[2]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[3]  Roberto Di Pietro,et al.  Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..

[4]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[5]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[6]  T.A. Zia,et al.  Reputation-based trust management in wireless sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[7]  Rastko R. Selmic,et al.  Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach , 2011, ICON 2011.

[8]  Sherali Zeadally,et al.  Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.

[9]  Labraoui Nabila,et al.  The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2014, 2014 International Conference on Advanced Networking Distributed Systems and Applications.

[10]  Jim Esch Prolog to A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proc. IEEE.

[11]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[12]  Hosein Marzi,et al.  An Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Network , 2013, ANT/SEIT.

[13]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[14]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[15]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[16]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[17]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[18]  Edwin Prem,et al.  A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies , 2011 .

[19]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[20]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[21]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[22]  S. Buchegger,et al.  A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .

[23]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[24]  Avinash Srinivasan,et al.  iTrust: an integrated trust framework for wireless sensor networks , 2010, SAC '10.

[25]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[26]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[27]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[28]  Guangjie Han,et al.  A Reliable Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[29]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[30]  S. Challa,et al.  Trust Management in Wireless Sensor Networks , 2007 .

[31]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[32]  Ioannis Papaefstathiou,et al.  DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS , 2010 .

[33]  Panagiotis Karkazis,et al.  DESIGN AND IMPLEMENTATION OF A TRUST -AWARE ROUTING PROTOCOL FOR LARGE WSN S , 2010 .

[34]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[35]  Haiguang Chen,et al.  Task-based Trust Management for Wireless Sensor Networks , 2009 .

[36]  K. Vijaya,et al.  Improving resilience and revocation by mitigating bad mouthing attacks in Wireless Sensor Networks , 2013 .

[37]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[38]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[39]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[40]  Kai Hwang,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[41]  G. Edwin Prem Kumar,et al.  A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network , 2012 .

[42]  Yuqing Zhang,et al.  Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.

[43]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[44]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[45]  Sok Sien. Choy,et al.  Security in mobile ad hoc networks , 2000 .

[46]  K.J.R. Liu,et al.  Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[47]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[48]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[49]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[50]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[51]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[52]  Jie Wu,et al.  A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[53]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[54]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[55]  Yang Xiang,et al.  A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.

[56]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[57]  Niki Pissinou,et al.  Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks , 2011, Int. J. Netw. Secur..

[58]  Audun Jøsang,et al.  Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review , 2013, IFIPTM.

[59]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.