Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2017

09-03-2016

MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks

Authors: Gulustan Dogan, Koksal Avincan

Published in: Peer-to-Peer Networking and Applications | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Trust is an important factor in Wireless Sensor Networks in order to assess the believability of the produced data. Due to the limited computational power and energy resources of the wireless sensor networks, it is a challenge to maintain trust while using the energy efficiently. Previously we developed a trust enhancing one-hop architecture called ProTru. In order to make the architecture more efficient for multi-hop WSNs, we developed a two-hop version of our previous architecture called MultiProTru. In this architecture routing is done based on the trust values of the cluster heads. One other difference of MultiProTru is to find untrusted data we use Kalman filtering approach whereas in ProTru uses Random Sample Consensus algorithm. We compared the effectiveness of MultiProTru with ProTru, ProTruKa and a current trust architecture called an Efficient Distributed Trust Model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Eschenauer L, Gligor V, Baras J (2004) On trust establishment in mobile ad-hoc networks. In: Security Protocols. Springer, pp 47–66 Eschenauer L, Gligor V, Baras J (2004) On trust establishment in mobile ad-hoc networks. In: Security Protocols. Springer, pp 47–66
2.
go back to reference Dogan G (2013) Protru: Leveraging provenance to enhance network trust in a wireless sensor network. City University of New York Dogan G (2013) Protru: Leveraging provenance to enhance network trust in a wireless sensor network. City University of New York
3.
go back to reference Rani U, Sundaram S (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8(2) Rani U, Sundaram S (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8(2)
4.
go back to reference Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3):15 Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3):15
5.
go back to reference Marzi H, Li M (2013) An enhanced bio-inspired trust and reputation model for wireless sensor network. Proc Comput Sci 19:1159–1166CrossRef Marzi H, Li M (2013) An enhanced bio-inspired trust and reputation model for wireless sensor network. Proc Comput Sci 19:1159–1166CrossRef
6.
go back to reference Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237CrossRef Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237CrossRef
7.
go back to reference Liu X, Baras JS (2014) Using trust in distributed consensus with adversaries in sensor and other networks. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE, pp 1–7 Liu X, Baras JS (2014) Using trust in distributed consensus with adversaries in sensor and other networks. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE, pp 1–7
8.
go back to reference Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, pp 277–283 Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, pp 277–283
9.
go back to reference Dai C, Lin D, Bertino E, Kantarcioglu M (2008) Trust evaluation of data provenance. Technical Report, Technical Report CERIAS TR 2001-147, Purdue University Dai C, Lin D, Bertino E, Kantarcioglu M (2008) Trust evaluation of data provenance. Technical Report, Technical Report CERIAS TR 2001-147, Purdue University
10.
go back to reference Lim HS, Moon YS, Bertino E (2009) Research issues in data provenance for streaming environments. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. ACM, p 58–62 Lim HS, Moon YS, Bertino E (2009) Research issues in data provenance for streaming environments. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. ACM, p 58–62
11.
go back to reference Lim HS, Moon YS, Bertino E (2010) Assessing the Trustworthiness of Streaming Data. Technical Report, Technical Report TR 2010-09, CERIAS, 2010 Lim HS, Moon YS, Bertino E (2010) Assessing the Trustworthiness of Streaming Data. Technical Report, Technical Report TR 2010-09, CERIAS, 2010
12.
go back to reference Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu YC (2005) Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks. In: International Conference on Dependable Systems and Networks. IEEE, pp 672–681 Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu YC (2005) Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks. In: International Conference on Dependable Systems and Networks. IEEE, pp 672–681
13.
go back to reference Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 2006. DSSNS 2006. IEEE , p 10–pp Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 2006. DSSNS 2006. IEEE , p 10–pp
14.
go back to reference Hur J, Lee Y, Yoon H, Choi D, Jin S (2005) Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005, volume 1. IEEE, pp 491–496 Hur J, Lee Y, Yoon H, Choi D, Jin S (2005) Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005, volume 1. IEEE, pp 491–496
15.
go back to reference Dogan G, Brown T, Govindan K, Khan MMH, Abdelzaher T, Mohapatra P, Cho JH (2011) Evaluation of network trust using provenance based on distributed local intelligence. In: Military Communications Conference. IEEE Dogan G, Brown T, Govindan K, Khan MMH, Abdelzaher T, Mohapatra P, Cho JH (2011) Evaluation of network trust using provenance based on distributed local intelligence. In: Military Communications Conference. IEEE
16.
go back to reference Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE, pp 603–607 Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE, pp 603–607
17.
go back to reference Xiao XY, Peng WC, Hung CC, Lee WC (2007) Using sensorranks for in-network detection of faulty readings in wireless sensor networks. In: proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access. ACM , pp 1–8 Xiao XY, Peng WC, Hung CC, Lee WC (2007) Using sensorranks for in-network detection of faulty readings in wireless sensor networks. In: proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access. ACM , pp 1–8
18.
go back to reference Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: International Conference on Performance, Computing, and Communications. IEEE, pp 463–469 Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: International Conference on Performance, Computing, and Communications. IEEE, pp 463–469
19.
go back to reference Srinivasan A, Li F, Wu J (2008) A novel cds-based reputation monitoring system for wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS’08. IEEE, pp 364–369 Srinivasan A, Li F, Wu J (2008) A novel cds-based reputation monitoring system for wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS’08. IEEE, pp 364–369
20.
go back to reference Momani M, Aboura K, Challa S (2007) Rbatmwsn: Recursive bayesian approach to trust management in wireless sensor networks. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, pp 347– 352 Momani M, Aboura K, Challa S (2007) Rbatmwsn: Recursive bayesian approach to trust management in wireless sensor networks. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, pp 347– 352
21.
go back to reference Ozdemir S (2008) Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput Commun 31(17):3941–3953CrossRef Ozdemir S (2008) Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput Commun 31(17):3941–3953CrossRef
22.
go back to reference Shaikh RA, Jameel H, Lee S, Rajput S, Song YJ (2006) Trust management problem in distributed wireless sensor networks. In: 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2006. Proceedings. IEEE, p 411–414 Shaikh RA, Jameel H, Lee S, Rajput S, Song YJ (2006) Trust management problem in distributed wireless sensor networks. In: 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2006. Proceedings. IEEE, p 411–414
23.
go back to reference Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(11–12):2413–2427CrossRef Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(11–12):2413–2427CrossRef
24.
go back to reference Li ZY, Liu L, Chen RL, Bi JL (2015) An adaptive secure communication framework for mobile peer-to-peer environments using bayesian games. Peer-to-Peer Networking and Applications:1–15 Li ZY, Liu L, Chen RL, Bi JL (2015) An adaptive secure communication framework for mobile peer-to-peer environments using bayesian games. Peer-to-Peer Networking and Applications:1–15
25.
go back to reference Han Q, Wen H, Ma T, Wu B (2015) Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Networking and Applications:1–11 Han Q, Wen H, Ma T, Wu B (2015) Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Networking and Applications:1–11
26.
27.
go back to reference Welch G, Bishop G (2006) An introduction to the kalman filter. 2006. University of North Carolina: Chapel Hill, North Carolina, US Welch G, Bishop G (2006) An introduction to the kalman filter. 2006. University of North Carolina: Chapel Hill, North Carolina, US
28.
go back to reference Fernández-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. IEEE, pp 25–30 Fernández-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. IEEE, pp 25–30
29.
go back to reference Cheney J, Chiticariu L, Tan WC (2009) Provenance in databases: Why, how, and where. Found Trends Databases 1(4):379–474CrossRef Cheney J, Chiticariu L, Tan WC (2009) Provenance in databases: Why, how, and where. Found Trends Databases 1(4):379–474CrossRef
Metadata
Title
MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks
Authors
Gulustan Dogan
Koksal Avincan
Publication date
09-03-2016
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2017
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0446-3

Other articles of this Issue 1/2017

Peer-to-Peer Networking and Applications 1/2017 Go to the issue

Premium Partner