Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures

As the trust issue in wireless sensor networks is emerging as one important factor in security schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper we categorize various types of attacks and countermeasures related to trust schemes in WSNs. Furthermore, we provide the development of trust mechanisms, give a short summarization of classical trust methodologies and emphasize the challenges of trust scheme in WSNs. An extensive literature survey is presented by summarizing state-of-the-art trust mechanisms in two categories: secure routing and secure data. Based on the analysis of attacks and the existing research, an open field and future direction with trust mechanisms in WSNs is provided.

[1]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[2]  Daniele Quercia,et al.  B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.

[3]  Rung Ching Chen,et al.  A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.

[4]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[5]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[6]  Saurabh Bagchi,et al.  TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[7]  George D. Stamoulis,et al.  Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[9]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[10]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[11]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[12]  Qinyuan Feng,et al.  RepTrap: a novel attack on feedback-based reputation systems , 2008, SecureComm.

[13]  Ming Zhou,et al.  Online reputation systems: Design and strategic practices , 2008, Decis. Support Syst..

[14]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[15]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[16]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[17]  S. Challa,et al.  Can we trust trusted nodes in wireless sensor networks? , 2008, 2008 International Conference on Computer and Communication Engineering.

[18]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[19]  B SrivastavaMani,et al.  Reputation-based framework for high integrity sensor networks , 2008 .

[20]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[21]  Joseph Y. Halpern,et al.  Updating Probabilities , 2002, UAI.

[22]  Suat Ozdemir,et al.  Secure and reliable data aggregation for wireless sensor networks , 2007 .

[23]  Jie Wu,et al.  A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[24]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[25]  Vijay Varadharajan,et al.  A Hybrid Trust Model for Enhancing Security in Distributed Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[26]  Félix Gómez Mármol,et al.  TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.

[27]  Vladimiro Sassone,et al.  A Bayesian Model for Event-based Trust , 2022 .

[28]  Jennifer Golbeck,et al.  Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..

[29]  Claudia Eckert,et al.  A Reputation System for Electronic Negotiations , 2008, WOSIS.

[30]  S. Quartz,et al.  Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.

[31]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[32]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[33]  Mm Momani,et al.  Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .

[34]  Yee Wei Law,et al.  How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[35]  Sushil K. Prasad,et al.  A distributed algorithmic framework for coverage problems in Wireless Sensor Networks , 2008, IPDPS.

[36]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[37]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[38]  Jie Wu,et al.  Secure and reliable broadcasting in wireless sensor networks using multi-parent trees , 2009, Secur. Commun. Networks.

[39]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[40]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[41]  Nicholas R. Jennings,et al.  A Hierarchical Bayesian Trust Model based on Reputation and Group Behaviour , 2008 .

[42]  Qi Shi,et al.  An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks , 2009, 2009 International Conference on Network and Service Security.

[43]  N.R. Prasad,et al.  A Security, Privacy and trust architecture for Wireless Sensor Networks , 2008, 2008 50th International Symposium ELMAR.

[44]  Bernd Lahno,et al.  Is Trust the Result of Bayesian Learning , 2004 .

[45]  Mohamed Eltoweissy,et al.  μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[46]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[47]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[48]  R. Mooney,et al.  Impact of Similarity Measures on Web-page Clustering , 2000 .

[49]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[50]  F. G. Marmol,et al.  TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[51]  Xiaoyang Sean Wang,et al.  Authorization in trust management: Features and foundations , 2008, CSUR.

[52]  Ling Wei,et al.  A Trust Model Based on Bayesian Approach , 2005, AWIC.

[53]  Margaret Martonosi,et al.  Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.

[54]  Rodrigo Roman,et al.  A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[55]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[56]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[57]  K. Komathy,et al.  Trust-based evolutionary game model assisting AODV routing against selfishness , 2008, J. Netw. Comput. Appl..

[58]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[59]  Hyunsoo Yoon,et al.  Trust Management for Resilient Wireless Sensor Networks , 2005, ICISC.

[60]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[61]  Young-Koo Lee,et al.  An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks , 2010, J. Networks.

[62]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[63]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[64]  Claudio Gutierrez,et al.  Survey of graph database models , 2008, CSUR.

[65]  Zabih Ghassemlooy,et al.  A MIMO-ANN system for increasing data rates in organic visible light communications systems , 2013, 2013 IEEE International Conference on Communications (ICC).

[66]  Paul Rabinovich,et al.  Secure Aggregation in Sensor Networks Using Neighborhood Watch , 2007, 2007 IEEE International Conference on Communications.