Abstract
Security plays a vital role in Wireless Sensor Networks (WSN) for providing reliability to the network. In WSN, where nodes, in addition to having their inbuilt capability of sensing, processing, and communicating data, also possess certain risks. These risks expose them to attacks and bring in many security challenges. Many researchers are engaged in developing innovative design paradigms to address security issues by developing trust management systems. In WSN, trust is important for the establishment of cooperation among the sensor nodes. The article presents a sociopsychological model for detecting fraudulent nodes in WSN. The three factors, viz. ability, benevolence, and integrity, are used for the computation of trust. Furthermore, the article provides a novel consensus-aware sociopsychological approach to deal even in the presence of higher number of fraudulent nodes than benevolent nodes. The proposed work has been implemented in the LabVIEW platform and extensive simulations were carried out to study its performance. Additionally, it is experimentally evaluated on a testbed of size 16 nodes to obtain results that demonstrate the accuracy and robustness of the proposed model.
- Jamal N. Al-Karaki and Ahmed E. Kamal. 2004. Routing techniques in wireless sensor networks: A survey. Wireless Commun. 11, 6, 6--28. Google ScholarDigital Library
- Th. Arampatzis, John Lygeros, and S. Manesis. 2005. A survey of applications of wireless sensors and wireless sensor networks. In Proc. International Symposium on Intelligent Control. 719--724.Google Scholar
- Idris M. Atakli, Hongbing Hu, Yu Chen, Wei Shinn Ku, and Zhou Su. 2008. Malicious node detection in wireless sensor networks using weighted trust evaluation. In Proc. Spring Simulation Multiconference. 836--843. Google ScholarDigital Library
- Valentina Baljak, Kenji Tei, and Shinichi Honiden. 2012. Classification of faults in sensor readings with statistical pattern recognition. In Proc. International Conference on Sensor Technologies and Applications, 6, 270--276.Google Scholar
- Kavitha Bhaskaran, Joan Triay, and Vinod M. Vokkarane. 2011. Dynamic anycast routing and wavelength assignment in WDM networks using ant colony optimization (ACO). In Proc. International Conference on Communications. 1--6.Google Scholar
- Antoine Bordes, Seyda Ertekin, Jason Weston, and Lon Bottou. 2005. Fast kernel classiers with online and active learning. J. Mach. Learn. Res. 6, 1579--1619. Google ScholarDigital Library
- Lon Bottou and Chih-Jen Lin. 2007. Support vector machine solvers. Large Scale Kernel Machines, 301--320.Google Scholar
- Haiguang Chen, Huafeng Wu, Xi Zhou, and Chuanshan Gao. 2007. Agent-based trust model in wireless sensor networks. In Proc. ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 8, 119--124. Google ScholarDigital Library
- Daniel-loan Curiac, Constantin Volosencu, Alex Doboli, Octa Vian Dranga, and Tomasz Bednarz. 2007. Discovery of malicious nodes in wireless sensor networks using neural predictors. WSEAS Trans. Comput. Res. 2, 1, 38--43.Google Scholar
- Jing Deng, Richard Han, and Shivakant Mishra. 2003. Enhancing base station security in wireless sensor networks. Technical Report CU-CS-951-03, Department of Computer Science, University of Colorado.Google Scholar
- Miroslav Fiedler. 1973. Algebraic connectivity of graphs. Czech. Math. J. 23, 2, 298--305.Google ScholarCross Ref
- Susan T. Fiske and Shelley E. Taylor. 2013. Social Cognition. McGraw-Hill, New York, NY, 2.Google Scholar
- Saurabh Ganeriwal and Mani B. Srivastava. 2004. Reputation-based framework for high integrity sensor networks. In Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04). 66--77. Google ScholarDigital Library
- Michael Hogan. 2013. Learning together and the challenge of collaboration. Retrieved on 2 December, 2013 from http://www.psychologytoday.com/blog/in-one-lifespan/201309/learning-together-and-the-challenge-collaboration.Google Scholar
- Catholijn M. Jonker and Jan Treur. 1999. Formal analysis of models for the dynamics of trust based on experiences. In The 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World: MultiAgent System Engineering. Google ScholarDigital Library
- Harold H. Kelley. 1967. Attribution theory in social psychology. In Nebraska Symposium on Motivation, 15, 192--238.Google Scholar
- Cristobald de Kerchove and Paul Van Dooren. 2010. Iterative filtering in reputation systems. SIAM J. Matrix Anal. Appl. 31, 4, 1812--1834. Google ScholarDigital Library
- Javier Lopez, Rodrigo Roman, Isaac Agudo, and Carmen Fernandez-Gago. 2010. Trust management systems for wireless sensor networks: Best practices. Comput. Commun. 33, 9, 1086--1093. Google ScholarDigital Library
- Christhu Raj MR, Edwin Prem Kumar G, and Kartheek Kusampudi. 2013. A survey on detecting selfish nodes in wireless sensor networks using different trust methodologies. Int. J. Eng. Adv. Technol. 2, 3, 197--200.Google Scholar
- Bertram F. Malle. 2003. Attributions as behavior explanations: Toward a new theory. Unpublished Article, University of Oregon.Google Scholar
- Gomez Marmol, Felix, and Gregorio Martnez Perez. 2011. Providing trust in wireless sensor networks using a bio-inspired technique. Telecommun. Syst. 46, 2, 163--180. Google ScholarDigital Library
- Roger C. Mayer, James H. Davis, and F. David Schoorman. 1995. An integrative model of organizational trust. Acad. Manag. Rev. 20, 3, 709--734.Google ScholarCross Ref
- Yuxin Meng, Wenjuan Li, and Lam-for Kwok. 2013. Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection. Network Syst Secur 7873, 40--53.Google ScholarCross Ref
- Russell Merris. 1994. Laplacian matrices of graphs: A survey. Lin. Algebr. Appl. 197, 143176.Google Scholar
- Mohammad Momani, K. Khalid Aboura, and Subhash Challa. 2007. RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks. In The Third International Conference on Intelligent Sensors, Sensor Networks and Information.Google ScholarCross Ref
- Mohammad Momani, Subhash Challa, and Rami Alhmouz. 2008. BNWSN: Bayesian network trust model for wireless sensor networks. In Proc. Mosharaka International Conference on Communications, Computers and Applications. 110--115.Google ScholarCross Ref
- Mohammad Momani and Subhash Challa. 2010. Survey of trust models in different network domains. Int. J. Ad Hoc Sens. Ubiq. Comput. 1, 3, 1--19.Google ScholarCross Ref
- Kevin Ni, Nithya Ramanathan, Mohamed Nabil Hajj Chehade, Laura Balzano, et al. 2009. Sensor network data fault types. ACM Trans. Sensor Networks 5, 3. Google ScholarDigital Library
- Reza Olfati-Saber, J. Alex Fax, and Richard M. Murray. 2007. Consensus and cooperation in networked multi-agent systems. Proc. IEEE, 95, 1, 215--233.Google ScholarCross Ref
- Luis M. Oliveira and Joel J. Rodrigues. 2011. Wireless sensor networks: A survey on environmental monitoring. J. Commun. 6, 2.Google ScholarCross Ref
- Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong. 2006. “Security in wireless sensor networks: Issues and challenges,” in proc. International Conference Advanced Communication Technology, 2, 8, 1043--1048.Google ScholarCross Ref
- Maurizio Porfiri and Daniel J. Stilwell. 2007. Stochastic consensus over weighted directed networks. In Proc. American Control Conference. 1425--1430.Google Scholar
- Kyle Porter, David Poole, Jacek Kisyski, Shinjiro Sueda, Byron Knoll, Alan Mackworth, Holger Hoos, Peter Gorniak, and Cristina Conati. 2013. Belief and decision networks tool. AISpace. Retrieved on 2 December, 2013 from http://aispace.org/bayes/.Google Scholar
- Heena Rathore and Sushmita Jha. 2013. Bio-inspired machine learning based wireless sensor network security. World Congress on Nature and Biologically Inspired Computing (NaBIC). 140--146.Google ScholarCross Ref
- Heena Rathore, Venkataramana Badarla, Sushmita Jha, and Anupam Gupta. 2014. Novel approach for security in wireless sensor network using bio-inspirations. In Proc. IEEE International Conference on Communication Systems and Networks (COMSNETS), 6, 1--8.Google ScholarCross Ref
- Heena Rathore and Venkataramana Badarla. 2014. Primary-secondary immune response adaptation for wireless sensor network. In Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, Los Alamitos, CA, 164--166.Google ScholarCross Ref
- Yenumula B. Reddy. 2012. Trust-based approach in wireless sensor networks using an agent to each cluster. Int. J. Secur. Priv. Trust. 1, 1, 19--36.Google Scholar
- Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation systems. Commun. ACM, 43, 45--48. Google ScholarDigital Library
- Mohsen Rezvani, Elisa Bertino, Sanjay Jha, and Aleksandar Ignjatovic. 2013. A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. In Proc. SenSys ACM Conference on Embedded Networked Sensor Systems, 11. Google ScholarDigital Library
- Mohsen Rezvani, Elisa Bertino, Aleksandar Ignatovic, and Sanjay Jha. 2014. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing.Google Scholar
- Shigen Shen, Yue Guangxue, Cao Qiying, and Yu Fei. 2011. A survey of game theory in wireless sensor networks security. J. Networks 6, 3, 521--532.Google ScholarCross Ref
- Shigen Shen, Changyuan Jiang, Hua Jiang, and Lizheng Guo et al. 2013. Evolutionary game based dynamics of trust decision in WSNs. In Proc. International Conference on Sensor Network Security Technology and Privacy Communication System (SNS and PCS). 1--4.Google Scholar
- Satwant Singh and Usvir Kaur. 2013. Review of trust based methodologies in WSNs. Int. J. Sci. Res. 2, 11, 184--185.Google Scholar
- H. H. Soliman, Noha A. Hikalb, and Nehal A. Sakrb. 2012. A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. 13, 2, 225--238.Google Scholar
- Jianping Song, Song Han, Aloysius K.Mok, Deji Chen, and Mark Nixon. 2007. Centralized control of wireless sensor networks for real-time applications. IFAC Proceedings Volumes, 40, 22, 25--32.Google ScholarCross Ref
- Alec Woo, Terence Tong, and David Culler. 2003. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proc. 1st International Conference on Embedded Networked Sensor Systems. ACM, New York, NY, 14--27. Google ScholarDigital Library
- Michael Wooldridge. 2002. An Introduction to Multiagent Systems. Wiley, New York, NY. Google ScholarDigital Library
- Guoxing Zhan, Weisong Shi, and Julia Deng. 2012. Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans. Dependable and Secure Computing 9, 2, 184--197. Google ScholarDigital Library
- Liu Zhiyuan, Zhang Zhigang, Liu SongSong, and Ke YeQing. 2011. A trust model based on Bayes theorem in WSNs. In Proc. International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), 7, 1--4.Google Scholar
Index Terms
- Consensus-Aware Sociopsychological Trust Model for Wireless Sensor Networks
Recommendations
Sociopsychological trust model for Wireless Sensor Networks
Trust plays a crucial role in establishing and retaining relationships. Sociopsychological analysis identifies three major constructs, such as ability, benevolence and integrity, upon which trust is being built up. On a similar note, in a Wireless ...
Reflections on the dimensions of trust and trustworthiness among online consumers
Trust is emerging as a potentially central aspect leading to IT acceptance. It is especially needed in the case of gaining and later retaining consumers of online vendors. This has been shown by previous research using single dimensional constructs. But ...
Reconceptualizing trust
We develop a formal and testable model of trust and its determinants.We use a multi-method approach (two laboratory experiments and a case study).Ability, benevolence and integrity are non-linearly related to trusting behaviors.For initial trust, ...
Comments