Skip to main content
Top
Published in: Soft Computing 9/2014

01-09-2014 | Focus

A dynamic trust model exploiting the time slice in WSNs

Authors: Guowei Wu, Zhuang Du, Yibo Hu, Taeyoung Jung, Ugo Fiore, Kangbin Yim

Published in: Soft Computing | Issue 9/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are composed of a large number of tiny sensor nodes that are self-organized through wireless communication. It aims to perceive, collect, and process information from network coverage areas. The open nature of WSNs makes them easily exposed to a variety of attacks and brings many security challenges. Furthermore, because of the limited resources, some nodes may refuse to forward packets by dropping them to save their resources such as battery, cache, and bandwidth. To resist the attacks from these selfish nodes and to punish them, we propose a fuzzy-based dynamic trust model in this paper. The model uses fuzzy sets combining with grey theory to evaluate every node’s trust credibility based on direct trust and indirect trust relationship. Only those with higher trust values can be chosen to forward packets. Those untrustworthy nodes with lower trust values will be detected and excluded from the trust list. Thus, our proposal also produces an incentive to compel the selfish nodes to wellbehave again to participate in the WSN again. Additionally, we introduce the time slice scheme to guarantee a reliable node possess enough time to enjoy its services, which can solve the problem that a suddenly interrupted link causes a significant decrease of the trust value. Simulation results show that our dynamic trust model can not only demonstrate the effectiveness in detecting selfish nodes, but also possess better performance even if the bursty traffic exists.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alcaraza C, Lopeza J, Romanb R, Chenc H-H (2012) Selecting key management schemes for wsn applications. Comput Secur 31(8):956–966CrossRef Alcaraza C, Lopeza J, Romanb R, Chenc H-H (2012) Selecting key management schemes for wsn applications. Comput Secur 31(8):956–966CrossRef
go back to reference Avinash S, Joshua T, Jie W (2006) Drbts: distributed reputation-based beacon trust system. In: Proceeding of the second IEEE international symposium on dependable, autonomic and secure computing. IEEE Press, New York, pp 277–283 Avinash S, Joshua T, Jie W (2006) Drbts: distributed reputation-based beacon trust system. In: Proceeding of the second IEEE international symposium on dependable, autonomic and secure computing. IEEE Press, New York, pp 277–283
go back to reference Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (January 1999) The role of trust management in distributed systems security. Secure Internet Program 1603(1):185–210 Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (January 1999) The role of trust management in distributed systems security. Secure Internet Program 1603(1):185–210
go back to reference Carullo G, Castiglione A, Cattaneo G, De Santis A, Fiore U, Palmieri F (2013) Feeltrust: providing trustworthy communications in ubiquitous mobile environment. In: Proceeding of the 27th IEEE international conference on advanced information networking and applications, AINA 2013, Barcelona, Spain, March 25–28, 2013, pp 1113–1120 Carullo G, Castiglione A, Cattaneo G, De Santis A, Fiore U, Palmieri F (2013) Feeltrust: providing trustworthy communications in ubiquitous mobile environment. In: Proceeding of the 27th IEEE international conference on advanced information networking and applications, AINA 2013, Barcelona, Spain, March 25–28, 2013, pp 1113–1120
go back to reference Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inform Syst 8(4):1207–1228 Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inform Syst 8(4):1207–1228
go back to reference Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceeding of the 2010 IEEE Globecom workshops (GC Wkshps). IEEE Press, New York, pp 153–157 Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceeding of the 2010 IEEE Globecom workshops (GC Wkshps). IEEE Press, New York, pp 153–157
go back to reference Fu C, Tang F, Cui Y, Liu M, Peng B (2009) Grey theory based nodes risk assessment in p2p networks. In: Proceeding of the IEEE international symposium on parallel and distributed processing with applications. IEEE Press, New York, pp 479–483 Fu C, Tang F, Cui Y, Liu M, Peng B (2009) Grey theory based nodes risk assessment in p2p networks. In: Proceeding of the IEEE international symposium on parallel and distributed processing with applications. IEEE Press, New York, pp 479–483
go back to reference Ganeriwal S, Balzano LK, Srivastava MB (May 2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(15):1–12 Ganeriwal S, Balzano LK, Srivastava MB (May 2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(15):1–12
go back to reference Garth VC, Niki P (2007) Cluster-based reputation and trust for wireless sensor networks. In: Proceeding of the consumer communications and networking conference Garth VC, Niki P (2007) Cluster-based reputation and trust for wireless sensor networks. In: Proceeding of the consumer communications and networking conference
go back to reference Garth VC, Niki P, James G (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceeding of the second IEEE workshop on dependability and security in sensor networks and systems, 2006. DSSNS 2006. IEEE Press, New York Garth VC, Niki P, James G (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceeding of the second IEEE workshop on dependability and security in sensor networks and systems, 2006. DSSNS 2006. IEEE Press, New York
go back to reference Haiguang C, Huafeng W, Xi Z, Chuanshan G (2007) Reputation-based trust in wireless sensor networks. In: Proceeding of the international conference on multimedia and ubiquitous engineering, 2007. MUE’07. IEEE Press, New York, pp 603–607 Haiguang C, Huafeng W, Xi Z, Chuanshan G (2007) Reputation-based trust in wireless sensor networks. In: Proceeding of the international conference on multimedia and ubiquitous engineering, 2007. MUE’07. IEEE Press, New York, pp 603–607
go back to reference Hsieh M-Y, Huang Y-M, Chao H-C (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11):2385–2400CrossRef Hsieh M-Y, Huang Y-M, Chao H-C (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11):2385–2400CrossRef
go back to reference Hua-An L, Chen S-Y (2012) An application of grey theory to global trade predictions based on airport cargo traffic. J Grey Syst 15(4):195–204 Hua-An L, Chen S-Y (2012) An application of grey theory to global trade predictions based on airport cargo traffic. J Grey Syst 15(4):195–204
go back to reference Jin-Hee C, Swami A, Ing-Ray C (2004) A survey on trust management for mobile ad hoc networks. Commun Surv Tutor IEEE 13(4):562–583 Jin-Hee C, Swami A, Ing-Ray C (2004) A survey on trust management for mobile ad hoc networks. Commun Surv Tutor IEEE 13(4):562–583
go back to reference Junbeom H, Younho L, Hyunsoo Y, Daeseon C, Seunghun J (2005) Trust evaluation model for wireless sensor networks. In: Proceeding of the seventh international conference on advanced communication technology, ICACT 2005, vol 1. IEEE Press, New York, pp 491–496 Junbeom H, Younho L, Hyunsoo Y, Daeseon C, Seunghun J (2005) Trust evaluation model for wireless sensor networks. In: Proceeding of the seventh international conference on advanced communication technology, ICACT 2005, vol 1. IEEE Press, New York, pp 491–496
go back to reference Klir GJ, Yuan B (1995) Fuzzy sets and fuzzy logic. Prentice Hall, New Jersey Klir GJ, Yuan B (1995) Fuzzy sets and fuzzy logic. Prentice Hall, New Jersey
go back to reference Li G-D, Yamaguchi D, Nagai M (2007) A grey-based decision-making approach to the supplier selection problem. Math Comput Model 46(3):573–581CrossRef Li G-D, Yamaguchi D, Nagai M (2007) A grey-based decision-making approach to the supplier selection problem. Math Comput Model 46(3):573–581CrossRef
go back to reference Li N, Das SK (2011) A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw Li N, Das SK (2011) A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw
go back to reference Liu B, Wu G, Yao K, Wang J (2011) A biometric key establishment protocol for body area networks. Distrib Sens Netw 2011(1):1–10 Liu B, Wu G, Yao K, Wang J (2011) A biometric key establishment protocol for body area networks. Distrib Sens Netw 2011(1):1–10
go back to reference Liu S, Forrest J, Yang Y (2012) A brief introduction to grey systems theory. Grey Syst Theory Appl 2(2):89–104 Liu S, Forrest J, Yang Y (2012) A brief introduction to grey systems theory. Grey Syst Theory Appl 2(2):89–104
go back to reference Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407CrossRefMATH Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407CrossRefMATH
go back to reference Maarouf I, Baroudi U, Naseer AR (2009) Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Commun 3(5):846–858CrossRef Maarouf I, Baroudi U, Naseer AR (2009) Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Commun 3(5):846–858CrossRef
go back to reference Mohammad M (2008) Bayesian methods for modelling and management of trust in wireless sensor networks. PhD thesis, University of technology, Sydney Mohammad M (2008) Bayesian methods for modelling and management of trust in wireless sensor networks. PhD thesis, University of technology, Sydney
go back to reference Mohammad M, Johnson A, Gina PN, Mahmood A et al (2006) A new algorithm of trust formation in wireless sensor networks. In: Proceeding of the the first IEEE international conference on wireless broadband and ultra wideband communications (AusWireless’ 06) Mohammad M, Johnson A, Gina PN, Mahmood A et al (2006) A new algorithm of trust formation in wireless sensor networks. In: Proceeding of the the first IEEE international conference on wireless broadband and ultra wideband communications (AusWireless’ 06)
go back to reference Mohammad M, Khalid A, Subhash C (2007) Rbatmwsn: recursive bayesian approach to trust management in wireless sensor networks. In: Proceeding of the the third international conference on intelligent sensors, sensor networks and information Mohammad M, Khalid A, Subhash C (2007) Rbatmwsn: recursive bayesian approach to trust management in wireless sensor networks. In: Proceeding of the the third international conference on intelligent sensors, sensor networks and information
go back to reference Mohammad M, Subhash C, Rami A (2008) Bnwsn: bayesian network trust model for wireless sensor networks. In: MIC-CCA 2008. IEEE mosharaka international conference on communications, computers and applications. IEEE Press, New York, pp 110–115 Mohammad M, Subhash C, Rami A (2008) Bnwsn: bayesian network trust model for wireless sensor networks. In: MIC-CCA 2008. IEEE mosharaka international conference on communications, computers and applications. IEEE Press, New York, pp 110–115
go back to reference Momani M, Johnson A, Navarrete G, Mahmood A et al (2005) Trust classification in wireless sensor networks Momani M, Johnson A, Navarrete G, Mahmood A et al (2005) Trust classification in wireless sensor networks
go back to reference Nathan L, Noria F (2008) An efficient reputation-based routing mechanism for wireless sensor networks: testing the impact of mobility and hostile nodes. In: Proceeding of the sixth annual conference on privacy, security and trust, 2008. PST’08. IEEE Press, New York, pp 151–155 Nathan L, Noria F (2008) An efficient reputation-based routing mechanism for wireless sensor networks: testing the impact of mobility and hostile nodes. In: Proceeding of the sixth annual conference on privacy, security and trust, 2008. PST’08. IEEE Press, New York, pp 151–155
go back to reference Nicola M, Licia C, Fabio P, Wolfgang E (2005) Tapas dynamic trust management. In: Technical Report IST-2001-34069, the European community under the information society technology programme Nicola M, Licia C, Fabio P, Wolfgang E (2005) Tapas dynamic trust management. In: Technical Report IST-2001-34069, the European community under the information society technology programme
go back to reference Pandurang K, Zhang Y, Trappe W (2005) Enhancing source-location privacy in sensor network routing. In: Proceeding of the 25th IEEE international conference on distributed computing systems, Columbus, Ohio, USA. IEEE Press, New York, pp 5996–5608 Pandurang K, Zhang Y, Trappe W (2005) Enhancing source-location privacy in sensor network routing. In: Proceeding of the 25th IEEE international conference on distributed computing systems, Columbus, Ohio, USA. IEEE Press, New York, pp 5996–5608
go back to reference Quteishat A, Lim CP, Saleh JM, Tweedale J, Jain LC (2011) A neural network-based multi-agent classifier system with a bayesian formalism for trust measurement. Soft Comput 15(2):221–231CrossRef Quteishat A, Lim CP, Saleh JM, Tweedale J, Jain LC (2011) A neural network-based multi-agent classifier system with a bayesian formalism for trust measurement. Soft Comput 15(2):221–231CrossRef
go back to reference Rahhal HA, Ali IA, Shaheen SI (2011) A novel trust-based cross-layer model for wireless sensor networks. In: Proceeding of the 2011 28th national radio science conference (NRSC). IEEE Press, New York, pp 1–10 Rahhal HA, Ali IA, Shaheen SI (2011) A novel trust-based cross-layer model for wireless sensor networks. In: Proceeding of the 2011 28th national radio science conference (NRSC). IEEE Press, New York, pp 1–10
go back to reference Shao F, Deng W, Yi F-j, Liu X-b (2009) Comprehensive evaluation method of metropolitan public transportation system based on analysis hierarchical process and grey theory. J PLA Univ Sci Technol (Nat Sci Ed) 6:536–541 Shao F, Deng W, Yi F-j, Liu X-b (2009) Comprehensive evaluation method of metropolitan public transportation system based on analysis hierarchical process and grey theory. J PLA Univ Sci Technol (Nat Sci Ed) 6:536–541
go back to reference Tajeddine A, Kayssi A, Chehab A, Artail H (2011) Fuzzy reputation-based trust model. Appl Soft Comput 11(1):345–355CrossRef Tajeddine A, Kayssi A, Chehab A, Artail H (2011) Fuzzy reputation-based trust model. Appl Soft Comput 11(1):345–355CrossRef
go back to reference Upendra S, Han HS, Lili Q, Yin Z (2008) Incentive-aware routing in dtns. In: ICNP 2008. IEEE international conference on network protocols. IEEE Press, New York, pp 238–247 Upendra S, Han HS, Lili Q, Yin Z (2008) Incentive-aware routing in dtns. In: ICNP 2008. IEEE international conference on network protocols. IEEE Press, New York, pp 238–247
go back to reference Vahdat A, Becker D et al (2000) Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006. Duke University, USA Vahdat A, Becker D et al (2000) Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006. Duke University, USA
go back to reference Vidhyapriya R, Vanathi PT (2007) Energy aware routing for wireless sensor networks. In: Proceeding of the international conference on signal processing, communications and networking. IEEE Press, New York, pp 545–550 Vidhyapriya R, Vanathi PT (2007) Energy aware routing for wireless sensor networks. In: Proceeding of the international conference on signal processing, communications and networking. IEEE Press, New York, pp 545–550
go back to reference Xing S, Zhang M, Bai Q (2012) A robust trust model for service oriented systems. J Comput Syst Sci 79:596–608 Xing S, Zhang M, Bai Q (2012) A robust trust model for service oriented systems. J Comput Syst Sci 79:596–608
Metadata
Title
A dynamic trust model exploiting the time slice in WSNs
Authors
Guowei Wu
Zhuang Du
Yibo Hu
Taeyoung Jung
Ugo Fiore
Kangbin Yim
Publication date
01-09-2014
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 9/2014
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1377-7

Other articles of this Issue 9/2014

Soft Computing 9/2014 Go to the issue

Premium Partner