A Comprehensive Trust Model Based on Multi-factors for WSNs

  • Na Wang 1. MoE Research Engineering Center for Software/ Hardware Co-Design Technology and Application East China Normal University No.3663 North Zhongshan Rd, Shanghai 2. Faculty of Engineering Shanghai Second Polytechnic University No.2360 Jinhai Rd, Shanghai
  • Yixiang Chen MoE Research Engineering Center for Software/ Hardware Co-Design Technology and Application East China Normal University No.3663 North Zhongshan Rd, Shanghai 200062 China


The goal of this paper is to introduce a novel trust model for wireless sensor networks. This trust model calculates trust value of nodes through two kinds of trusts: private trust and interactive trust of a node. Private trust focuses on the past record of a node’s sensing and its remaining energy. Interactive trust cares for the interaction of a node with its neighbors. This trust model can recognize faulty nodes inside a network, reduce their impaction to data acquisition, and select a trust routing for precise data transmission. A simulation is given and shows that this trust model has a higher performance than TMS and ECCR in some aspects. But it consumes more energy than ECCR for its comprehensive structure of data.


[1] Osman Khalid, Samee U.Khan(2013); Comparative study of trust and reputation systems for wireless sensor networks, Secutity and Communication Networks, 6(6):669-688.

[2] Xiang Gu, Jianlina Qiu, Jina Wang(2012); Research on Trust Model of Sensor Nodes in WSNs, Procedia Engineering, 29(2012):909-913.

[3] Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu(2013); Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2013(2013):9-18.

[4] K.Hoffman, D.Zage, C.Nita-Rotaru(2009); A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42(1):1-31.

[5] C.Karlof, D.Wagner(2012); Secure routing in wireless sensor networks, International Journal of Computer Science Issues, 9(1): 187¨C191.

[6] J.Lopez, R. Roman, C.Alcaraz(2009); Analysis of security threats, requirements, technologies and standards in wireless sensor networks, Foundations of Security Analysis and Design, 25(2):289-338.

[7] B.Xiao, B.Yu(2006); Detecting selective forwarding attacks in wireless sensor networks, In Proceedings of the 20th International Parallel and Distributed Processing Symposium, 2006(2006):1-8.

[8] Y.Yu, K.Li, W.Zhou, P.Li(2012); Trust mechanisms in wireless sensor networks: attack analysis and countermeasures, Journal of Network and Computer Applications, 35(3): 867- 880.

[9] E.Aivaloglou, S.Gritzalis, C.Skianis(2008); Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach, International Journal of Systems Engineering, 16(5): 128-148.

[10] R Feng, X Xu, X Zhou, J Wan(2011); A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory, Sensors, 11(2):1345-1360.

[11] Riaz Ahmed, S.Jameel(2009); Group-based trust management scheme for clustered wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 20(11): 1698- 1712.

[12] Ganeriwal(2008); Reputation-Based Framework for High Integrity Sensor Networks, In Proceedings of ACM workshop security of ad hoc and sensor networks, 4(3): 66-72.

[13] V.R. Sarma Dhulipala, N.Karthik, RM.Chandrasekaran(2013); A Novel Heuristic Approach Based TrustWorthy Architecture for Wireless Sensor Networks, Wireless Pers Commun, 18(3):189-205.

[14] Na Wang, YiXiang Chen(2013); A Fault-Event Detection Model Using Trust Matrix in WSN, Sensors & Transducers journal, 158(11):190-194.

[15] Na Wang, Yanxia Pang(2014); An improved light-weight trust model in WSN, Computer Modeling & New Technologies, 18(4):57-61.

[16] Hongwei Tao, Yixiang Chen(2010); Another Metric Model for Trustworthiness of Softwares Based on Partition, Advances in Intelligent and Soft Computing, 82(2010):695-705.

[17] Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010);

[17] Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010); Measurement of Trust Transitivity in Trustworthy Networks, Journal of Emerging Technologies in Web Intelligence, 2(4):319-325.

[18] Na Wang, YuePing Wu(2013); Data aggregation for failure tolerance in wireless sensor network, Applied Mechanics and Materials, 347(2013): 965-969.

[19] C.Intanagonwiwat, R.Govindan, D.Estrin(2000); A scalable and robust communication paradigm for sensor networks, In Proc. Sixth Annual International Conference on Mobile Computing and Networks, 28(2000): 238-249.

[20] L Ruan, H W Du, X H Jia, et al(2004); A greedy approximation for minimum connected dominating sets, Theoretical Computer Science, 329(1-3): 325-330.

[21] Y Tang, M T Zhou(2007); Maximal independent set based distributed algorithm for minimum connected dominating set, Acta Electronica Sinica, 35(5): 868-874.

[22] Machado Kassio, Rosario Denis(2013); A routing protocol based on energy and link quality for internet of things applications, Sensors, 13(2):1942-1964.
How to Cite
WANG, Na; CHEN, Yixiang. A Comprehensive Trust Model Based on Multi-factors for WSNs. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 10, n. 2, p. 248-262, apr. 2005. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/1756>. Date accessed: 22 may 2022.


Wireless Sensor Networks, Trust Model, Private trust, interactive trust, Trust routing