Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2020

05-04-2020

PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks

Authors: Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze

Published in: Peer-to-Peer Networking and Applications | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the ability of a node as a continuum based on the current battery level and outage probability of the network. PSTRM also utilise an Elliptic-Curve Cryptography Diffie-Hellman (ECCDH) privacy-aware dissemination framework which encourages the sharing of accurate and credible indirect reputation information within network neighbourhoods. The following social constructs, viz., ability, benevolence and consistency were considered in the design of the proposed model. The detection rate of the proposed model was evaluated against that by Rathore et al., using MATLAB. PSTRM was found to have high detection rates than the proposal by Rathore et al.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Nunoo-Mensah H, Boateng KO, Gadze JD (2017) Tamper-aware authentication framework for wireless sensor networks. IET Wireless Sensor Systems 7(3):73–81CrossRef Nunoo-Mensah H, Boateng KO, Gadze JD (2017) Tamper-aware authentication framework for wireless sensor networks. IET Wireless Sensor Systems 7(3):73–81CrossRef
2.
go back to reference Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688CrossRef Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688CrossRef
4.
go back to reference Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security (final). DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1(1) Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security (final). DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1(1)
5.
go back to reference Ishmanov F, Kim SW, Nam SY (2015) A robust trust establishment scheme for wireless sensor networks. Sensors 15(3):7040–7061CrossRef Ishmanov F, Kim SW, Nam SY (2015) A robust trust establishment scheme for wireless sensor networks. Sensors 15(3):7040–7061CrossRef
6.
go back to reference Rani VU, Sundaram KS (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8:371–377 Rani VU, Sundaram KS (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8:371–377
7.
go back to reference Gambetta D et al (2000) Can we trust trust. Trust: Making and Breaking Cooperative Relations 13:213–237 Gambetta D et al (2000) Can we trust trust. Trust: Making and Breaking Cooperative Relations 13:213–237
8.
go back to reference Krackhardt D, Nohria N, Eccles B (2003) The strength of strong ties. Netw Knowl Econ 82 Krackhardt D, Nohria N, Eccles B (2003) The strength of strong ties. Netw Knowl Econ 82
9.
go back to reference Pai S, Roosta T, Wicker S, Sastry S (2007) Using social network theory towards development of wireless ad hoc network trust. In: 21st international conference on advanced information networking and applications workshops, 2007, AINAW’07, vol 1. IEEE, pp 443–450 Pai S, Roosta T, Wicker S, Sastry S (2007) Using social network theory towards development of wireless ad hoc network trust. In: 21st international conference on advanced information networking and applications workshops, 2007, AINAW’07, vol 1. IEEE, pp 443–450
10.
go back to reference Glynos D, Argyroudis P, Douligeris C (2012) Collaborative service evaluation with the TwoHop trust framework. Secur Commun Netw 5(6):594–613CrossRef Glynos D, Argyroudis P, Douligeris C (2012) Collaborative service evaluation with the TwoHop trust framework. Secur Commun Netw 5(6):594–613CrossRef
11.
go back to reference He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans Inf Technol Biomed 16(4):623–632CrossRef He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans Inf Technol Biomed 16(4):623–632CrossRef
12.
go back to reference Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692CrossRef Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692CrossRef
13.
go back to reference Rathore H, Jha S (2013) Bio-inspired machine learning based wireless sensor network security. In: 2013 world congress on nature and biologically inspired computing (NaBIC). IEEE, pp 140–146 Rathore H, Jha S (2013) Bio-inspired machine learning based wireless sensor network security. In: 2013 world congress on nature and biologically inspired computing (NaBIC). IEEE, pp 140–146
14.
go back to reference Zhang M, Xu C, Guan J, Zheng R, Wu Q, Zhang H (2014) A novel bio-inspired trusted routing protocol for mobile wireless sensor networks. TIIS 8(1):74–90CrossRef Zhang M, Xu C, Guan J, Zheng R, Wu Q, Zhang H (2014) A novel bio-inspired trusted routing protocol for mobile wireless sensor networks. TIIS 8(1):74–90CrossRef
15.
go back to reference Song J, Li X, Hu J, Xu G, Feng Z (2015) Dynamic trust evaluation of wireless sensor networks based on multi-factor. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol 1. IEEE, pp 33–40 Song J, Li X, Hu J, Xu G, Feng Z (2015) Dynamic trust evaluation of wireless sensor networks based on multi-factor. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol 1. IEEE, pp 33–40
16.
go back to reference Sánchez Alcón JA, López L, Martínez J-F, Rubio Cifuentes G (2015) Trust and privacy solutions based on holistic service requirements. Sensors 16(1):16CrossRef Sánchez Alcón JA, López L, Martínez J-F, Rubio Cifuentes G (2015) Trust and privacy solutions based on holistic service requirements. Sensors 16(1):16CrossRef
17.
go back to reference Liu L, Chen L, Jia H (2016) Social Milieu oriented routing: a new dimension to enhance network security in WSNs. Sensors 16(2):247CrossRef Liu L, Chen L, Jia H (2016) Social Milieu oriented routing: a new dimension to enhance network security in WSNs. Sensors 16(2):247CrossRef
18.
go back to reference Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451MathSciNetCrossRef Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451MathSciNetCrossRef
19.
go back to reference Thangaraju P, Paul RM (2016) A novel survey regarding efficient distributed trust model in WSN. International Journal of Applied Engineering Research (IJAER):127–134 Thangaraju P, Paul RM (2016) A novel survey regarding efficient distributed trust model in WSN. International Journal of Applied Engineering Research (IJAER):127–134
20.
go back to reference Rathore H, Badarla V, George KJ (2016) Sociopsychological trust model for wireless sensor networks. J Netw Comput Appl 62:75–87CrossRef Rathore H, Badarla V, George KJ (2016) Sociopsychological trust model for wireless sensor networks. J Netw Comput Appl 62:75–87CrossRef
21.
go back to reference Wang J, Jiang S, Fapojuwo AO (2017) A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors 17(6):1227CrossRef Wang J, Jiang S, Fapojuwo AO (2017) A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors 17(6):1227CrossRef
22.
go back to reference Chen Z, Tian L, Lin C (2017) Trust model of wireless sensor networks and its application in data fusion. Sensors 17(4):703CrossRef Chen Z, Tian L, Lin C (2017) Trust model of wireless sensor networks and its application in data fusion. Sensors 17(4):703CrossRef
23.
go back to reference Sathish S, Ayyasamy A, Archana M (2018) An intelligent beta reputation and dynamic trust model for secure communication in wireless networks. In: Industry interactive innovations in science, engineering and technology. Springer, pp 395–402 Sathish S, Ayyasamy A, Archana M (2018) An intelligent beta reputation and dynamic trust model for secure communication in wireless networks. In: Industry interactive innovations in science, engineering and technology. Springer, pp 395–402
24.
go back to reference She W, Liu Q, Tian Z, Chen J-S, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956CrossRef She W, Liu Q, Tian Z, Chen J-S, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956CrossRef
25.
go back to reference Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M et al (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240CrossRef Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M et al (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240CrossRef
26.
go back to reference Beheshtiasl A, Ghaffari A (2019) Secure and trust-aware routing scheme in wireless sensor networks. Wirel Pers Commun 107(4):1799–1814CrossRef Beheshtiasl A, Ghaffari A (2019) Secure and trust-aware routing scheme in wireless sensor networks. Wirel Pers Commun 107(4):1799–1814CrossRef
27.
go back to reference Zawaideh F, Salamah M (2019) An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. Int J Commun Syst 32(3):e3878CrossRef Zawaideh F, Salamah M (2019) An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. Int J Commun Syst 32(3):e3878CrossRef
28.
go back to reference Wu X, Huang J, Ling J, Shu L (2019) BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access 7:43679–43690CrossRef Wu X, Huang J, Ling J, Shu L (2019) BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access 7:43679–43690CrossRef
29.
go back to reference Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616CrossRef Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616CrossRef
30.
go back to reference Zhao J, Huang J, Xiong N (2019) An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access 7:33859–33869CrossRef Zhao J, Huang J, Xiong N (2019) An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access 7:33859–33869CrossRef
31.
go back to reference Nunoo-Mensah H, Boateng KO, Gadze JD (2017) The adoption of socio-and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int J Commun Syst 31:e3444CrossRef Nunoo-Mensah H, Boateng KO, Gadze JD (2017) The adoption of socio-and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int J Commun Syst 31:e3444CrossRef
33.
go back to reference Zhang K, Xu K, Wei F (2018) A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks. Wireless Commun Mobile Comput 2018 Zhang K, Xu K, Wei F (2018) A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks. Wireless Commun Mobile Comput 2018
34.
go back to reference Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394CrossRef Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394CrossRef
35.
go back to reference Tajeddine A, Kayssi A, Chehab A, Elhajj I, Itani W (2015) CENTERA: a centralised trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 15(2):3299–3333CrossRef Tajeddine A, Kayssi A, Chehab A, Elhajj I, Itani W (2015) CENTERA: a centralised trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 15(2):3299–3333CrossRef
36.
go back to reference Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451MathSciNetCrossRef Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451MathSciNetCrossRef
37.
go back to reference Tajeddine A, Kayssi A, Chehab A (2012) CENTER: a centralized trust-based efficient routing protocol for wireless sensor networks. In: 2012 tenth annual international conference on privacy, security and trust (PST). IEEE, pp 195–202 Tajeddine A, Kayssi A, Chehab A (2012) CENTER: a centralized trust-based efficient routing protocol for wireless sensor networks. In: 2012 tenth annual international conference on privacy, security and trust (PST). IEEE, pp 195–202
38.
go back to reference Liu G, Wang Y, Orgun MA, Lim E-P (2013) Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans Serv Comput 6(2):152–167CrossRef Liu G, Wang Y, Orgun MA, Lim E-P (2013) Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans Serv Comput 6(2):152–167CrossRef
39.
go back to reference Liu G, Zhao L, Zheng K, Liu A, Xu J, Li Z, Bouguettaya A (2015) An efficient method to find the optimal social trust path in contextual social graphs. In: International conference on database systems for advanced applications. Springer, Cham, pp 399–417 Liu G, Zhao L, Zheng K, Liu A, Xu J, Li Z, Bouguettaya A (2015) An efficient method to find the optimal social trust path in contextual social graphs. In: International conference on database systems for advanced applications. Springer, Cham, pp 399–417
40.
go back to reference Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568CrossRef Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568CrossRef
41.
go back to reference Colquitt JA, Scott BA, LePine JA (2007) Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. American Psychological Association Colquitt JA, Scott BA, LePine JA (2007) Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. American Psychological Association
42.
go back to reference Holtz BC (2013) Trust primacy: a model of the reciprocal relations between trust and perceived justice. J Manag 39(7):1891–1923 Holtz BC (2013) Trust primacy: a model of the reciprocal relations between trust and perceived justice. J Manag 39(7):1891–1923
43.
go back to reference Klogo GS, Gadze JD, Diawuo H (2014) Radio coverage analysis of anchor nodes for the localization and monitoring of smart energy meters (SEM). Int J Comput Appl 85(13) Klogo GS, Gadze JD, Diawuo H (2014) Radio coverage analysis of anchor nodes for the localization and monitoring of smart energy meters (SEM). Int J Comput Appl 85(13)
44.
go back to reference Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556CrossRef Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556CrossRef
Metadata
Title
PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks
Authors
Henry Nunoo-Mensah
Kwame Osei Boateng
James Dzisi Gadze
Publication date
05-04-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00906-5

Other articles of this Issue 5/2020

Peer-to-Peer Networking and Applications 5/2020 Go to the issue

Premium Partner