A Comprehensive Trust Model Based on Multi-factors for WSNs
Keywords:Wireless Sensor Networks, Trust Model, Private trust, interactive trust, Trust routing
AbstractThe goal of this paper is to introduce a novel trust model for wireless sensor networks. This trust model calculates trust value of nodes through two kinds of trusts: private trust and interactive trust of a node. Private trust focuses on the past record of a node’s sensing and its remaining energy. Interactive trust cares for the interaction of a node with its neighbors. This trust model can recognize faulty nodes inside a network, reduce their impaction to data acquisition, and select a trust routing for precise data transmission. A simulation is given and shows that this trust model has a higher performance than TMS and ECCR in some aspects. But it consumes more energy than ECCR for its comprehensive structure of data.
Osman Khalid, Samee U.Khan(2013); Comparative study of trust and reputation systems for wireless sensor networks, Secutity and Communication Networks, 6(6):669-688.
Xiang Gu, Jianlina Qiu, Jina Wang(2012); Research on Trust Model of Sensor Nodes in WSNs, Procedia Engineering, 29(2012):909-913. http://dx.doi.org/10.1016/j.proeng.2012.01.063
Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu(2013); Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2013(2013):9-18.
K.Hoffman, D.Zage, C.Nita-Rotaru(2009); A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42(1):1-31. http://dx.doi.org/10.1145/1592451.1592452
C.Karlof, D.Wagner(2012); Secure routing in wireless sensor networks, International Journal of Computer Science Issues, 9(1): 187Ã‚Â¨C191.
J.Lopez, R. Roman, C.Alcaraz(2009); Analysis of security threats, requirements, technologies and standards in wireless sensor networks, Foundations of Security Analysis and Design, 25(2):289-338.
B.Xiao, B.Yu(2006); Detecting selective forwarding attacks in wireless sensor networks, In Proceedings of the 20th International Parallel and Distributed Processing Symposium, 2006(2006):1-8.
Y.Yu, K.Li, W.Zhou, P.Li(2012); Trust mechanisms in wireless sensor networks: attack analysis and countermeasures, Journal of Network and Computer Applications, 35(3): 867- 880. http://dx.doi.org/10.1016/j.jnca.2011.03.005
E.Aivaloglou, S.Gritzalis, C.Skianis(2008); Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach, International Journal of Systems Engineering, 16(5): 128-148.
R Feng, X Xu, X Zhou, J Wan(2011); A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory, Sensors, 11(2):1345-1360.
Riaz Ahmed, S.Jameel(2009); Group-based trust management scheme for clustered wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 20(11): 1698- 1712.
Ganeriwal(2008); Reputation-Based Framework for High Integrity Sensor Networks, In Proceedings of ACM workshop security of ad hoc and sensor networks, 4(3): 66-72.
V.R. Sarma Dhulipala, N.Karthik, RM.Chandrasekaran(2013); A Novel Heuristic Approach Based TrustWorthy Architecture for Wireless Sensor Networks, Wireless Pers Commun, 18(3):189-205.
Na Wang, YiXiang Chen(2013); A Fault-Event Detection Model Using Trust Matrix in WSN, Sensors & Transducers journal, 158(11):190-194.
Na Wang, Yanxia Pang(2014); An improved light-weight trust model in WSN, Computer Modeling & New Technologies, 18(4):57-61.
Hongwei Tao, Yixiang Chen(2010); Another Metric Model for Trustworthiness of Softwares Based on Partition, Advances in Intelligent and Soft Computing, 82(2010):695-705. http://dx.doi.org/10.1007/978-3-642-15660-1_70
Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010);
Yixiang Chen, TianMing Bu, Min Zhang, Hong Zhu(2010); Measurement of Trust Transitivity in Trustworthy Networks, Journal of Emerging Technologies in Web Intelligence, 2(4):319-325.
Na Wang, YuePing Wu(2013); Data aggregation for failure tolerance in wireless sensor network, Applied Mechanics and Materials, 347(2013): 965-969.
C.Intanagonwiwat, R.Govindan, D.Estrin(2000); A scalable and robust communication paradigm for sensor networks, In Proc. Sixth Annual International Conference on Mobile Computing and Networks, 28(2000): 238-249.
L Ruan, H W Du, X H Jia, et al(2004); A greedy approximation for minimum connected dominating sets, Theoretical Computer Science, 329(1-3): 325-330. http://dx.doi.org/10.1016/j.tcs.2004.08.013
Y Tang, M T Zhou(2007); Maximal independent set based distributed algorithm for minimum connected dominating set, Acta Electronica Sinica, 35(5): 868-874.
Machado Kassio, Rosario Denis(2013); A routing protocol based on energy and link quality for internet of things applications, Sensors, 13(2):1942-1964. http://dx.doi.org/10.3390/s130201942
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.