A Comprehensive Trust Model Based on Multi-factors for WSNs

Authors

  • Na Wang 1. MoE Research Engineering Center for Software/ Hardware Co-Design Technology and Application East China Normal University No.3663 North Zhongshan Rd, Shanghai 2. Faculty of Engineering Shanghai Second Polytechnic University No.2360 Jinhai Rd, Shanghai
  • Yixiang Chen MoE Research Engineering Center for Software/ Hardware Co-Design Technology and Application East China Normal University No.3663 North Zhongshan Rd, Shanghai 200062 China

Keywords:

Wireless Sensor Networks, Trust Model, Private trust, interactive trust, Trust routing

Abstract

The goal of this paper is to introduce a novel trust model for wireless sensor networks. This trust model calculates trust value of nodes through two kinds of trusts: private trust and interactive trust of a node. Private trust focuses on the past record of a node’s sensing and its remaining energy. Interactive trust cares for the interaction of a node with its neighbors. This trust model can recognize faulty nodes inside a network, reduce their impaction to data acquisition, and select a trust routing for precise data transmission. A simulation is given and shows that this trust model has a higher performance than TMS and ECCR in some aspects. But it consumes more energy than ECCR for its comprehensive structure of data.

References

Osman Khalid, Samee U.Khan(2013); Comparative study of trust and reputation systems for wireless sensor networks, Secutity and Communication Networks, 6(6):669-688.

Xiang Gu, Jianlina Qiu, Jina Wang(2012); Research on Trust Model of Sensor Nodes in WSNs, Procedia Engineering, 29(2012):909-913. http://dx.doi.org/10.1016/j.proeng.2012.01.063

Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu(2013); Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2013(2013):9-18.

K.Hoffman, D.Zage, C.Nita-Rotaru(2009); A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42(1):1-31. http://dx.doi.org/10.1145/1592451.1592452

C.Karlof, D.Wagner(2012); Secure routing in wireless sensor networks, International Journal of Computer Science Issues, 9(1): 187¨C191.

J.Lopez, R. Roman, C.Alcaraz(2009); Analysis of security threats, requirements, technologies and standards in wireless sensor networks, Foundations of Security Analysis and Design, 25(2):289-338.

B.Xiao, B.Yu(2006); Detecting selective forwarding attacks in wireless sensor networks, In Proceedings of the 20th International Parallel and Distributed Processing Symposium, 2006(2006):1-8.

Y.Yu, K.Li, W.Zhou, P.Li(2012); Trust mechanisms in wireless sensor networks: attack analysis and countermeasures, Journal of Network and Computer Applications, 35(3): 867- 880. http://dx.doi.org/10.1016/j.jnca.2011.03.005

E.Aivaloglou, S.Gritzalis, C.Skianis(2008); Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach, International Journal of Systems Engineering, 16(5): 128-148.

R Feng, X Xu, X Zhou, J Wan(2011); A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory, Sensors, 11(2):1345-1360.

Riaz Ahmed, S.Jameel(2009); Group-based trust management scheme for clustered wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 20(11): 1698- 1712.

Ganeriwal(2008); Reputation-Based Framework for High Integrity Sensor Networks, In Proceedings of ACM workshop security of ad hoc and sensor networks, 4(3): 66-72.

V.R. Sarma Dhulipala, N.Karthik, RM.Chandrasekaran(2013); A Novel Heuristic Approach Based TrustWorthy Architecture for Wireless Sensor Networks, Wireless Pers Commun, 18(3):189-205.

Na Wang, YiXiang Chen(2013); A Fault-Event Detection Model Using Trust Matrix in WSN, Sensors & Transducers journal, 158(11):190-194.

Na Wang, Yanxia Pang(2014); An improved light-weight trust model in WSN, Computer Modeling & New Technologies, 18(4):57-61.

Hongwei Tao, Yixiang Chen(2010); Another Metric Model for Trustworthiness of Softwares Based on Partition, Advances in Intelligent and Soft Computing, 82(2010):695-705. http://dx.doi.org/10.1007/978-3-642-15660-1_70

Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010);

Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010); Measurement of Trust Transitivity in Trustworthy Networks, Journal of Emerging Technologies in Web Intelligence, 2(4):319-325.

Na Wang, YuePing Wu(2013); Data aggregation for failure tolerance in wireless sensor network, Applied Mechanics and Materials, 347(2013): 965-969.

C.Intanagonwiwat, R.Govindan, D.Estrin(2000); A scalable and robust communication paradigm for sensor networks, In Proc. Sixth Annual International Conference on Mobile Computing and Networks, 28(2000): 238-249.

L Ruan, H W Du, X H Jia, et al(2004); A greedy approximation for minimum connected dominating sets, Theoretical Computer Science, 329(1-3): 325-330. http://dx.doi.org/10.1016/j.tcs.2004.08.013

Y Tang, M T Zhou(2007); Maximal independent set based distributed algorithm for minimum connected dominating set, Acta Electronica Sinica, 35(5): 868-874.

Machado Kassio, Rosario Denis(2013); A routing protocol based on energy and link quality for internet of things applications, Sensors, 13(2):1942-1964. http://dx.doi.org/10.3390/s130201942

Published

2005-04-01

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.