A Comprehensive Trust Model Based on Multi-factors for WSNs


  • Na Wang 1. MoE Research Engineering Center for Software/ Hardware Co-Design Technology and Application East China Normal University No.3663 North Zhongshan Rd, Shanghai 2. Faculty of Engineering Shanghai Second Polytechnic University No.2360 Jinhai Rd, Shanghai
  • Yixiang Chen MoE Research Engineering Center for Software/ Hardware Co-Design Technology and Application East China Normal University No.3663 North Zhongshan Rd, Shanghai 200062 China


Wireless Sensor Networks, Trust Model, Private trust, interactive trust, Trust routing


The goal of this paper is to introduce a novel trust model for wireless sensor networks. This trust model calculates trust value of nodes through two kinds of trusts: private trust and interactive trust of a node. Private trust focuses on the past record of a node’s sensing and its remaining energy. Interactive trust cares for the interaction of a node with its neighbors. This trust model can recognize faulty nodes inside a network, reduce their impaction to data acquisition, and select a trust routing for precise data transmission. A simulation is given and shows that this trust model has a higher performance than TMS and ECCR in some aspects. But it consumes more energy than ECCR for its comprehensive structure of data.


Osman Khalid, Samee U.Khan(2013); Comparative study of trust and reputation systems for wireless sensor networks, Secutity and Communication Networks, 6(6):669-688.

Xiang Gu, Jianlina Qiu, Jina Wang(2012); Research on Trust Model of Sensor Nodes in WSNs, Procedia Engineering, 29(2012):909-913. http://dx.doi.org/10.1016/j.proeng.2012.01.063

Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu(2013); Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2013(2013):9-18.

K.Hoffman, D.Zage, C.Nita-Rotaru(2009); A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42(1):1-31. http://dx.doi.org/10.1145/1592451.1592452

C.Karlof, D.Wagner(2012); Secure routing in wireless sensor networks, International Journal of Computer Science Issues, 9(1): 187¨C191.

J.Lopez, R. Roman, C.Alcaraz(2009); Analysis of security threats, requirements, technologies and standards in wireless sensor networks, Foundations of Security Analysis and Design, 25(2):289-338.

B.Xiao, B.Yu(2006); Detecting selective forwarding attacks in wireless sensor networks, In Proceedings of the 20th International Parallel and Distributed Processing Symposium, 2006(2006):1-8.

Y.Yu, K.Li, W.Zhou, P.Li(2012); Trust mechanisms in wireless sensor networks: attack analysis and countermeasures, Journal of Network and Computer Applications, 35(3): 867- 880. http://dx.doi.org/10.1016/j.jnca.2011.03.005

E.Aivaloglou, S.Gritzalis, C.Skianis(2008); Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach, International Journal of Systems Engineering, 16(5): 128-148.

R Feng, X Xu, X Zhou, J Wan(2011); A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory, Sensors, 11(2):1345-1360.

Riaz Ahmed, S.Jameel(2009); Group-based trust management scheme for clustered wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 20(11): 1698- 1712.

Ganeriwal(2008); Reputation-Based Framework for High Integrity Sensor Networks, In Proceedings of ACM workshop security of ad hoc and sensor networks, 4(3): 66-72.

V.R. Sarma Dhulipala, N.Karthik, RM.Chandrasekaran(2013); A Novel Heuristic Approach Based TrustWorthy Architecture for Wireless Sensor Networks, Wireless Pers Commun, 18(3):189-205.

Na Wang, YiXiang Chen(2013); A Fault-Event Detection Model Using Trust Matrix in WSN, Sensors & Transducers journal, 158(11):190-194.

Na Wang, Yanxia Pang(2014); An improved light-weight trust model in WSN, Computer Modeling & New Technologies, 18(4):57-61.

Hongwei Tao, Yixiang Chen(2010); Another Metric Model for Trustworthiness of Softwares Based on Partition, Advances in Intelligent and Soft Computing, 82(2010):695-705. http://dx.doi.org/10.1007/978-3-642-15660-1_70

Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010);

Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010); Measurement of Trust Transitivity in Trustworthy Networks, Journal of Emerging Technologies in Web Intelligence, 2(4):319-325.

Na Wang, YuePing Wu(2013); Data aggregation for failure tolerance in wireless sensor network, Applied Mechanics and Materials, 347(2013): 965-969.

C.Intanagonwiwat, R.Govindan, D.Estrin(2000); A scalable and robust communication paradigm for sensor networks, In Proc. Sixth Annual International Conference on Mobile Computing and Networks, 28(2000): 238-249.

L Ruan, H W Du, X H Jia, et al(2004); A greedy approximation for minimum connected dominating sets, Theoretical Computer Science, 329(1-3): 325-330. http://dx.doi.org/10.1016/j.tcs.2004.08.013

Y Tang, M T Zhou(2007); Maximal independent set based distributed algorithm for minimum connected dominating set, Acta Electronica Sinica, 35(5): 868-874.

Machado Kassio, Rosario Denis(2013); A routing protocol based on energy and link quality for internet of things applications, Sensors, 13(2):1942-1964. http://dx.doi.org/10.3390/s130201942



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.