Skip to main content
Log in

Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Secure data aggregation exerts more and more important effects on the research of wireless sensor network. There occurs many groping research subject, via managing nodes’ trust and reputation to keep data aggregation secure. The nodes in wireless sensor networks are often compromised and those compromised nodes will do a lot of harmful behaviors to decrease the security of wireless sensor networks. These behaviors include impersonate legal nodes to join routing paths, selectively forward data to an adversary, inject erroneous data, and disrupt data transmission. Thus, the conception of nodes’ trust is introduced into data aggregation to judge and evaluate whether the nodes are trustable or not. In this paper, we propose an improved trust management method for data aggregation based on the relationship between nodes that is called the strength of the ties between the nodes. The improved method is developed from the trust model in the iRTEDA protocol and increasing the utilization efficiency of second-hand information coming from neighboring nodes. The aim of the proposed trust model is to obtain a higher level of security for data aggregation. The simulation results show us that data aggregation, based on proposed trust management method, can get higher accuracy of evaluating nodes’ trust and reputation and achieve higher data accuracy of aggregating.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Akyildiz, I. F., Weilian, S., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Article  Google Scholar 

  2. Culler, D., Estrin, D., & Srivastava, M. (2004). Guest editors’ introduction: overview of sensor networks. IEEE Computer, 37(8), 41–49.

    Article  Google Scholar 

  3. Yu, J., Yang, J., & Wang, H. (2014). Fault detection for large-scale railway maintenance equipment base on wireless sensor networks. Sensors & Transducers, 169, 1726–5479.

    Google Scholar 

  4. Akkaya, K., Demirbas, M., & Aygun, R. S. (2008). The impact of data aggregation on the performance of wireless sensor networks. Wireless Communications and Mobile Computing, 8(2), 171–193.

    Article  Google Scholar 

  5. Rajagopalan, R., & Varshney, P. K. (2006). Data aggregation techniques in sensor networks: A survey. IEEE Communications Surveys and Tutorials, 8(4), 48–63.

    Article  Google Scholar 

  6. Zhang, Z. J., Lai, C. F., & Chao, H. C. (2014). A green data transmission mechanism for wireless multimedia sensor networks using information fusion. Wireless Communications, IEEE, 21(4), 14–19.

    Article  Google Scholar 

  7. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.

    Article  Google Scholar 

  8. Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer and Networks, 53(12), 2022–2037.

    Article  Google Scholar 

  9. Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34(4), 591–597.

    Article  Google Scholar 

  10. Roy, S., Conti, M., Setia, S., et al. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040–1052.

    Article  Google Scholar 

  11. Roy, S., Conti, M., Setia, S., et al. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security, 9, 681–694.

    Article  Google Scholar 

  12. Ganeriwal, S., & Srivastava, M. (2004). Reputation based framework for high integrity sensor networks, In Procedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, (pp. 66–77).

  13. Ganeriwal, S., Balzano, L. K., & Srivastava, M. (2008). Reputation based framework for high integrity sensor networks. ACM Transactions on Sensor Networks, 4(3), 1–37.

  14. Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., & Cardei, M. (2008). Reputation and trust-based systems for Ad Hoc and sensor networks. In A. Boukerche (Ed.), Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks. Chichester: Wiley.

    Google Scholar 

  15. Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., & Song, Y. J. (2006). Trust management problem in distributed wireless sensor netowkrs. In Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA’06 (pp. 411–414). Sydney, Australia.

  16. Ozdemir, S. (2008). Functional reputation based data aggregation for wireless sensor networks. In IEEE International Conference on Wireless & Mobile Computing, Networking & Communication (pp. 592–597).

  17. Ozdemir, S. (2008). Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Communications, 31(17), 3941–3953.

    Article  Google Scholar 

  18. Liu, C.-X., Liu, Y., & Zhang, Z.-J. (2013). Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013(652495), 11. doi:10.1155/2013/652495.

    Google Scholar 

  19. Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–1380.

    Article  Google Scholar 

  20. Onnela, J. P., Saramaki, J., et al. (2007). Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences, 104(18), 7332–7336.

    Article  Google Scholar 

  21. Josang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th Bled Conference Electronic Commerce (p. 41).

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China Under Grants 61071076, Beijing Natural Science Foundation Under Grants 4132057, National High-tech Research And Development Plans (863 Program) Under Grants 2011AA010104-2, Fundamental Research Funds for the Central Universities (2015YJS027), The Academic Discipline and Postgraduate Education Project of Beijing Municipal Commission of Education.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Liu, Cx. & Zeng, QA. Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks. Telecommun Syst 62, 319–325 (2016). https://doi.org/10.1007/s11235-015-0078-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-015-0078-6

Keywords

Navigation