Skip to main content
Erschienen in: Wireless Personal Communications 2/2023

11.01.2023

RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNs

verfasst von: Tayyab Khan, Karan Singh

Erschienen in: Wireless Personal Communications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trust estimation approaches in wireless sensor networks (WSNs) are mainly used to improve security, reliability, system efficiency, lifespan, decision-making, and collaboration (dependability) among sensor nodes. There are various existing trust estimation approaches incompetent to satisfy the fundamental requirements of WSN, like resource (power, energy, communication bandwidth) efficiency, long network lifetime, node availability, communication, and memory overheads. In this paper, we provide an efficient and accurate weight-based trust management approach that employs communication (direct, indirect) trust and data trust along with compressive sensing technique to alleviate several internal attacks like badmouthing, black-hole, and grey-hole attacks for clustered WSN. The core part of the proposed scheme is an efficient trust estimation function. The proposed trust estimation function computes the communication trust as well as data trust to analyze the cooperation level and data consistency respectively for better decision making. Although, existing schemes do not incorporate data trust during trust evaluation which leads to incorrect trust decisions. Moreover, the proposed reliable trust model which is known as RTM that provides adaptability and flexibility in terms of application requirements with reduced transmission overhead. RTM employs a simple, lightweight, and flexible approach for trust estimation. RTM uses a hybrid approach within clusters as well as with clusters to reduce communication overhead.RTM employs the concept of a directly (direct) trusted node and resolves the weight-assignment problem of existing weighted trust models of WSNs. Furthermore, this paper presents motivation and vision for WSNs as well as emphasizes the strength of the weighted approach by assigning suitable weights according to application requirements. The proposed trust model has been compared with the existing state-of-the-art trust models such as LDTS, LWTM, etc. Experimental results demonstrate excellent performance in terms of malicious behavior detection, prevention, the detection accuracy of selfish nodes, cooperation, as well as resource efficiency to protect WSN. RTM can detect 2.10%, 12.63%, 15.78% more malicious nodes than LWTM (Singh et al. in IETE J Res 63(3):297–308, 2017), ADCT (Talbi et al. in Telecommun Syst 65(4):605–619, 2017), LDTS (Li et al. in IEEE Trans Inf Forensics Secur 8(6):924–935, 2013) respectively in the network consisting of 500 nodes. Moreover, RTM can accurately detect 10%, and 12% more malicious nodes than LTS (Khan et al. in IEEE Access 7:58221–58240, 2019) and ADCT respectively in the presence of malicious nodes. Furthermore, RTM has 50%, 98% less inter-cluster communication overhead than LWTM, and ADCT in the presence of 100 clusters in the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Momani, M. (2010). Trust models in wireless sensor networks: A survey. In International conference on network security and applications. Springer. Momani, M. (2010). Trust models in wireless sensor networks: A survey. In International conference on network security and applications. Springer.
2.
Zurück zum Zitat Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662–667. Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662–667.
3.
Zurück zum Zitat Nayak, P., & Vathasavai, B. (2017). Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic. IEEE Sensors Journal, 17(14), 4492–4499. Nayak, P., & Vathasavai, B. (2017). Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic. IEEE Sensors Journal, 17(14), 4492–4499.
4.
Zurück zum Zitat Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Sensors Journal, 12(10), 2941–2949. Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Sensors Journal, 12(10), 2941–2949.
5.
Zurück zum Zitat Kimoto, A., Sugitani, N., & Fujisaki, S. (2010). A multifunctional tactile sensor based on PVDF films for identification of materials. IEEE Sensors Journal, 10(9), 1508–1513. Kimoto, A., Sugitani, N., & Fujisaki, S. (2010). A multifunctional tactile sensor based on PVDF films for identification of materials. IEEE Sensors Journal, 10(9), 1508–1513.
6.
Zurück zum Zitat Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183. Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.
7.
Zurück zum Zitat Ganeriwal, S., & Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop security of ad hoc and sensor networks (SASN ’04) (pp. 66–67). Ganeriwal, S., & Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop security of ad hoc and sensor networks (SASN ’04) (pp. 66–67).
8.
Zurück zum Zitat Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the third IEEE international conference on mobile ad-hoc and sensor systems (MASS ’06) (pp. 437–446). Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the third IEEE international conference on mobile ad-hoc and sensor systems (MASS ’06) (pp. 437–446).
9.
Zurück zum Zitat Boukerche, A., Li, X., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30, 2413–2427. Boukerche, A., Li, X., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30, 2413–2427.
10.
Zurück zum Zitat Zhang, J., et al. (2010). A trust management architecture for hierarchical wireless sensor networks. In IEEE local computer network conference. IEEE. Zhang, J., et al. (2010). A trust management architecture for hierarchical wireless sensor networks. In IEEE local computer network conference. IEEE.
11.
Zurück zum Zitat Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
12.
Zurück zum Zitat Li, X., Zhou, F., & Junping, Du. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935. Li, X., Zhou, F., & Junping, Du. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.
13.
Zurück zum Zitat Frampton, K. D. (2006). Acoustic self-localization in a distributed sensor network. IEEE Sensors Journal, 6(1), 166–172. Frampton, K. D. (2006). Acoustic self-localization in a distributed sensor network. IEEE Sensors Journal, 6(1), 166–172.
14.
Zurück zum Zitat Kumar, A., Srivastava, V., Singh, M. K., & Hancke, G. P. (2014). Current status of the IEEE 1451 standard-based sensor applications. IEEE Sensors Journal, 15(5), 2505–2513. Kumar, A., Srivastava, V., Singh, M. K., & Hancke, G. P. (2014). Current status of the IEEE 1451 standard-based sensor applications. IEEE Sensors Journal, 15(5), 2505–2513.
15.
Zurück zum Zitat Singh, M., et al. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297–308. Singh, M., et al. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297–308.
16.
Zurück zum Zitat Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor networks. IEEE Transactions on Wireless Communications, 10(11), 3973–3983. Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor networks. IEEE Transactions on Wireless Communications, 10(11), 3973–3983.
17.
Zurück zum Zitat Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, 18(15), 6446–6460. Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, 18(15), 6446–6460.
18.
Zurück zum Zitat Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690. Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690.
19.
Zurück zum Zitat Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869. Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869.
20.
Zurück zum Zitat Yang, L., Yinzhi, Lu., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404–71412. Yang, L., Yinzhi, Lu., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404–71412.
21.
Zurück zum Zitat Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593. Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.
22.
Zurück zum Zitat Talbi, S., et al. (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommunication Systems, 65(4), 605–619. Talbi, S., et al. (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommunication Systems, 65(4), 605–619.
23.
Zurück zum Zitat Ishmanov, F., Kim, S., & Nam, S. (2014). A secure trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897. Ishmanov, F., Kim, S., & Nam, S. (2014). A secure trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.
24.
Zurück zum Zitat Górski, J., & Turower, A. (2018). A method of trust management in wireless sensor networks. International Journal of Security, Privacy, and Trust Management, 7, 1–19. Górski, J., & Turower, A. (2018). A method of trust management in wireless sensor networks. International Journal of Security, Privacy, and Trust Management, 7, 1–19.
25.
Zurück zum Zitat Rani, R., Kumar, S., & Dohare, U. (2019). Trust evaluation for light weight security in sensor enabled internet of things: Game theory oriented approach. IEEE Internet of Things Journal, 6(5), 8421–8432. Rani, R., Kumar, S., & Dohare, U. (2019). Trust evaluation for light weight security in sensor enabled internet of things: Game theory oriented approach. IEEE Internet of Things Journal, 6(5), 8421–8432.
26.
Zurück zum Zitat Meng, W., Choo, K.-K.R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management, 15(2), 761–773. Meng, W., Choo, K.-K.R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management, 15(2), 761–773.
27.
Zurück zum Zitat Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144. Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144.
28.
Zurück zum Zitat Khan, T., Singh, K., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering-based approach for large scale wireless sensor networks. IEEE Access, 7, 58221–58240. Khan, T., Singh, K., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering-based approach for large scale wireless sensor networks. IEEE Access, 7, 58221–58240.
29.
Zurück zum Zitat AlSkaif, T., Zapata, M. G., & Bellalta, B. (2015). Game theory for energy efficiency in wireless sensor networks: Latest trends. Journal of Network and Computer Applications, 54, 33–61. AlSkaif, T., Zapata, M. G., & Bellalta, B. (2015). Game theory for energy efficiency in wireless sensor networks: Latest trends. Journal of Network and Computer Applications, 54, 33–61.
30.
Zurück zum Zitat Abrardo, A., Balucanti, L., & Mecocci, A. (2013). A game theory distributed approach for energy optimization in WSNs. ACM Transactions on Sensor Networks (TOSN), 9(4), 44. Abrardo, A., Balucanti, L., & Mecocci, A. (2013). A game theory distributed approach for energy optimization in WSNs. ACM Transactions on Sensor Networks (TOSN), 9(4), 44.
31.
Zurück zum Zitat Ai, X., Srinivasan, V., & Tham, C.-K. (2008). Optimality and complexity of pure Nash equilibria in the coverage game. IEEE Journal on Selected Areas in Communications, 26(7), 1170–1182. Ai, X., Srinivasan, V., & Tham, C.-K. (2008). Optimality and complexity of pure Nash equilibria in the coverage game. IEEE Journal on Selected Areas in Communications, 26(7), 1170–1182.
32.
Zurück zum Zitat Asadi, M., Zimmerman, C., & Agah, A. (2013). A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security, 15(1), 50–58. Asadi, M., Zimmerman, C., & Agah, A. (2013). A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security, 15(1), 50–58.
33.
Zurück zum Zitat Bharathi, M. A., & Vijaya Kumar, B. P. (2012). Reverse game theory approach for aggregator nodes selection with ant colony optimization based routing in wireless sensor network. International Journal of Computer Science Issues (IJCSI), 9(6), 292. Bharathi, M. A., & Vijaya Kumar, B. P. (2012). Reverse game theory approach for aggregator nodes selection with ant colony optimization based routing in wireless sensor network. International Journal of Computer Science Issues (IJCSI), 9(6), 292.
34.
Zurück zum Zitat Cano, C., Bellalta, B., Sfairopoulou, A., & Barceló, J. (2009). A low power listening MAC with scheduled wake up after transmissions for WSNs. IEEE Communications Letters, 13(4), 221–223. Cano, C., Bellalta, B., Sfairopoulou, A., & Barceló, J. (2009). A low power listening MAC with scheduled wake up after transmissions for WSNs. IEEE Communications Letters, 13(4), 221–223.
35.
Zurück zum Zitat Chao, C.-M., & Hsiao, T.-Y. (2014). Design of structure-free and energy-balanced data aggregation in wireless sensor networks. Journal of Network and Computer Applications, 37, 229–239. Chao, C.-M., & Hsiao, T.-Y. (2014). Design of structure-free and energy-balanced data aggregation in wireless sensor networks. Journal of Network and Computer Applications, 37, 229–239.
36.
Zurück zum Zitat Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54(18), 3421–3430.MATH Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54(18), 3421–3430.MATH
37.
Zurück zum Zitat Chen, Z., Qiao, C., Qiu, Y., Li, Xu., & Wei, Wu. (2014). Dynamics stability in wireless sensor networks active defense model. Journal of Computer and System Sciences, 80(8), 1534–1548.MathSciNetMATH Chen, Z., Qiao, C., Qiu, Y., Li, Xu., & Wei, Wu. (2014). Dynamics stability in wireless sensor networks active defense model. Journal of Computer and System Sciences, 80(8), 1534–1548.MathSciNetMATH
38.
Zurück zum Zitat Dai, L., Chang, Y., & Shen, Z. (2011). A non-cooperative game algorithm for task scheduling in wireless sensor networks. International Journal of Computers Communications and Control, 6(4), 592–602. Dai, L., Chang, Y., & Shen, Z. (2011). A non-cooperative game algorithm for task scheduling in wireless sensor networks. International Journal of Computers Communications and Control, 6(4), 592–602.
39.
Zurück zum Zitat Delicato, F., Protti, F., De Rezende, J. F., Rust, L., & Pirmez, L. (2005). Application-driven node management in multihop wireless sensor networks. In International conference on networking (pp. 569–576). Springer. Delicato, F., Protti, F., De Rezende, J. F., Rust, L., & Pirmez, L. (2005). Application-driven node management in multihop wireless sensor networks. In International conference on networking (pp. 569–576). Springer.
40.
Zurück zum Zitat Duan, J., Gao, D., Yang, D., Foh, C. H., & Chen, H.-H. (2014). An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet of Things Journal, 1(1), 58–69. Duan, J., Gao, D., Yang, D., Foh, C. H., & Chen, H.-H. (2014). An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet of Things Journal, 1(1), 58–69.
41.
Zurück zum Zitat Edalat, N., Tham, C.-K., & Xiao, W. (2012). An auction-based strategy for distributed task allocation in wireless sensor networks. Computer Communications, 35(8), 916–928. Edalat, N., Tham, C.-K., & Xiao, W. (2012). An auction-based strategy for distributed task allocation in wireless sensor networks. Computer Communications, 35(8), 916–928.
42.
Zurück zum Zitat Guerrero-Zapata, M., Zilan, R., Barceló-Ordinas, J. M., Bicakci, K., & Tavli, B. (2010). The future of security in wireless multimedia sensor networks. Telecommunication Systems, 45(1), 77–91. Guerrero-Zapata, M., Zilan, R., Barceló-Ordinas, J. M., Bicakci, K., & Tavli, B. (2010). The future of security in wireless multimedia sensor networks. Telecommunication Systems, 45(1), 77–91.
43.
Zurück zum Zitat Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201. Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.
44.
Zurück zum Zitat Hao, X.-C., Zhang, Y.-X., Jia, N., & Liu, B. (2013). Virtual game-based energy balanced topology control algorithm for wireless sensor networks. Wireless personal communications, 69(4), 1289–1308. Hao, X.-C., Zhang, Y.-X., Jia, N., & Liu, B. (2013). Virtual game-based energy balanced topology control algorithm for wireless sensor networks. Wireless personal communications, 69(4), 1289–1308.
45.
Zurück zum Zitat Hao, X.-C., Gong, Q.-Q., Hou, S., & Liu, B. (2014). Joint channel allocation and power control optimal algorithm based on non-cooperative game in wireless sensor networks. Wireless personal communications, 78(2), 1047–1061. Hao, X.-C., Gong, Q.-Q., Hou, S., & Liu, B. (2014). Joint channel allocation and power control optimal algorithm based on non-cooperative game in wireless sensor networks. Wireless personal communications, 78(2), 1047–1061.
46.
Zurück zum Zitat He, X., & Gui, X. (2009). The localized area coverage algorithm based on game-theory for WSN. JNW, 4(10), 1001–1008. He, X., & Gui, X. (2009). The localized area coverage algorithm based on game-theory for WSN. JNW, 4(10), 1001–1008.
47.
Zurück zum Zitat Jing, H., & Aida, H. (2010). Cooperative clustering algorithms for wireless sensor networks. Smart Wireless Sensor Networks, 2010, 157. Jing, H., & Aida, H. (2010). Cooperative clustering algorithms for wireless sensor networks. Smart Wireless Sensor Networks, 2010, 157.
48.
Zurück zum Zitat Karl, H., & Willig, A. (2007). Protocols and architectures for wireless sensor networks. Wiley. Karl, H., & Willig, A. (2007). Protocols and architectures for wireless sensor networks. Wiley.
49.
Zurück zum Zitat Komali, R. S., MacKenzie, A. B., & Gilles, R. P. (2008). Effect of selfish node behavior on efficient topology design. IEEE Transactions on Mobile Computing, 7(9), 1057–1070. Komali, R. S., MacKenzie, A. B., & Gilles, R. P. (2008). Effect of selfish node behavior on efficient topology design. IEEE Transactions on Mobile Computing, 7(9), 1057–1070.
50.
Zurück zum Zitat Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking (TON), 14(6), 1167–1178. Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking (TON), 14(6), 1167–1178.
51.
Zurück zum Zitat Wu, R., Deng, X., Rongxing, Lu., & Shen, X. (2015). Trust-based anomaly detection in emerging sensor networks. International Journal of Distributed Sensor Networks, 11(10), 363569. Wu, R., Deng, X., Rongxing, Lu., & Shen, X. (2015). Trust-based anomaly detection in emerging sensor networks. International Journal of Distributed Sensor Networks, 11(10), 363569.
52.
Zurück zum Zitat Henna, S. (2017). Energy efficient fault tolerant coverage in wireless sensor networks. Journal of Sensors, 2017, 7090782. Henna, S. (2017). Energy efficient fault tolerant coverage in wireless sensor networks. Journal of Sensors, 2017, 7090782.
53.
Zurück zum Zitat Langendoen, K., & Meier, A. (2010). Analyzing MAC protocols for low data-rate applications. ACM Transactions on Sensor Networks (TOSN), 7(2), 19. Langendoen, K., & Meier, A. (2010). Analyzing MAC protocols for low data-rate applications. ACM Transactions on Sensor Networks (TOSN), 7(2), 19.
54.
Zurück zum Zitat Liao, W.-H., Kao, Y., & Fan, C.-M. (2008). Data aggregation in wireless sensor networks using ant colony algorithm. Journal of Network and Computer Applications, 31(4), 387–401. Liao, W.-H., Kao, Y., & Fan, C.-M. (2008). Data aggregation in wireless sensor networks using ant colony algorithm. Journal of Network and Computer Applications, 31(4), 387–401.
55.
Zurück zum Zitat Liu, A.-F., Zhang, P.-H., & Chen, Z.-G. (2011). Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. Journal of Parallel and Distributed Computing, 71(10), 1327–1355.MATH Liu, A.-F., Zhang, P.-H., & Chen, Z.-G. (2011). Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. Journal of Parallel and Distributed Computing, 71(10), 1327–1355.MATH
56.
Zurück zum Zitat Liu, H., Liu, G., Liu, Y., Mo, L., & Chen, H. (2014). Adaptive quantization for distributed estimation in energy-harvesting wireless sensor networks: A game-theoretic approach. International Journal of Distributed Sensor Networks, 10(7), 217918. Liu, H., Liu, G., Liu, Y., Mo, L., & Chen, H. (2014). Adaptive quantization for distributed estimation in energy-harvesting wireless sensor networks: A game-theoretic approach. International Journal of Distributed Sensor Networks, 10(7), 217918.
57.
Zurück zum Zitat Luo, J., Pan, C., Li, R., & Ge, F. (2012). Power control in distributed wireless sensor networks based on noncooperative game theory. International Journal of Distributed Sensor Networks, 8(12), 398460. Luo, J., Pan, C., Li, R., & Ge, F. (2012). Power control in distributed wireless sensor networks based on noncooperative game theory. International Journal of Distributed Sensor Networks, 8(12), 398460.
58.
Zurück zum Zitat Meshkati, F., Vincent Poor, H., & Schwartz, S. C. (2007). Energy-efficient resource allocation in wireless networks: An overview of game-theoretic approaches. arXiv:0705.1787 Meshkati, F., Vincent Poor, H., & Schwartz, S. C. (2007). Energy-efficient resource allocation in wireless networks: An overview of game-theoretic approaches. arXiv:​0705.​1787
59.
Zurück zum Zitat Nasser N,ChenY.SEEM:secure and energy-efficient multipath routing protocol for wireless sensor networks.ComputCommun2007;30(11–12):2401–12. Nasser N,ChenY.SEEM:secure and energy-efficient multipath routing protocol for wireless sensor networks.ComputCommun2007;30(11–12):2401–12.
60.
Zurück zum Zitat Pandana, C., Han, Z., & Ray Liu, K. J. (2008). Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks. IEEE Transactions on Wireless Communications, 7(8), 3150–3163. Pandana, C., Han, Z., & Ray Liu, K. J. (2008). Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks. IEEE Transactions on Wireless Communications, 7(8), 3150–3163.
61.
Zurück zum Zitat Pantazis, N. A. (2007). Survey on power control issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 9(4), 86–107.MathSciNet Pantazis, N. A. (2007). Survey on power control issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 9(4), 86–107.MathSciNet
62.
Zurück zum Zitat Yin, X., & Li, S. (2019). Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 198.MathSciNet Yin, X., & Li, S. (2019). Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 198.MathSciNet
63.
Zurück zum Zitat Muaddi, A. B., & Tomko, A. A. (2008). Intrusion detection system for wireless networks. U.S. Patent 7,366,148, issued April 29, 2008. Muaddi, A. B., & Tomko, A. A. (2008). Intrusion detection system for wireless networks. U.S. Patent 7,366,148, issued April 29, 2008.
64.
Zurück zum Zitat Wu, X., Chen, G., & Das, S. K. (2008). Avoiding energy holes in wireless sensor networks with nonuniform node distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 710–720. Wu, X., Chen, G., & Das, S. K. (2008). Avoiding energy holes in wireless sensor networks with nonuniform node distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 710–720.
65.
Zurück zum Zitat Younis, M., Senturk, I. F., Akkaya, K., Lee, S., & Senel, F. (2014). Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks, 58, 254–283. Younis, M., Senturk, I. F., Akkaya, K., Lee, S., & Senel, F. (2014). Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks, 58, 254–283.
66.
Zurück zum Zitat Rathore, H., Badarla, V., & George, K. J. (2016). Sociopsychological trust model for wireless sensor networks. Journal of Network and Computer Applications, 62, 75–87. Rathore, H., Badarla, V., & George, K. J. (2016). Sociopsychological trust model for wireless sensor networks. Journal of Network and Computer Applications, 62, 75–87.
67.
Zurück zum Zitat Zarifzadeh, S., & Yazdani, N. (2013). Neighbor selection game in wireless ad hoc networks. Wireless Personal Communications, 70(2), 617–640. Zarifzadeh, S., & Yazdani, N. (2013). Neighbor selection game in wireless ad hoc networks. Wireless Personal Communications, 70(2), 617–640.
68.
Zurück zum Zitat Zeydan, E., Kivanc, D., Comaniciu, C., & Tureli, U. (2012). Energy-efficient routing for correlated data in wireless sensor networks. Ad Hoc Networks, 10(6), 962–975. Zeydan, E., Kivanc, D., Comaniciu, C., & Tureli, U. (2012). Energy-efficient routing for correlated data in wireless sensor networks. Ad Hoc Networks, 10(6), 962–975.
69.
Zurück zum Zitat Zheng, J., Bhuiyan, M. Z. A., Liang, S., Xing, X., & Wang, G. (2014). Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Generation Computer Systems, 39, 88–99. Zheng, J., Bhuiyan, M. Z. A., Liang, S., Xing, X., & Wang, G. (2014). Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Generation Computer Systems, 39, 88–99.
70.
Zurück zum Zitat Zhang, H., & Hou, J. C. (2005). On the upper bound of α-lifetime for large sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 272–300. Zhang, H., & Hou, J. C. (2005). On the upper bound of α-lifetime for large sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 272–300.
71.
Zurück zum Zitat Pandey, A., & Tripathi, R. C. (2010). A survey on wireless sensor networks security. International Journal of Computer Applications, 3(2), 43–49. Pandey, A., & Tripathi, R. C. (2010). A survey on wireless sensor networks security. International Journal of Computer Applications, 3(2), 43–49.
72.
Zurück zum Zitat Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: honey bee mating intelligence approach. Procedia Technology, 10, 515–523. Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: honey bee mating intelligence approach. Procedia Technology, 10, 515–523.
73.
Zurück zum Zitat Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. (2019). TBRS: A trust based recommendation scheme for vehicular CPS network. Future Generation Computer Systems, 92, 383–398. Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. (2019). TBRS: A trust based recommendation scheme for vehicular CPS network. Future Generation Computer Systems, 92, 383–398.
74.
Zurück zum Zitat Feng, R., Han, X., Liu, Q., & Ning, Yu. (2015). A credible Bayesian-based trust management scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 11(11), 678926. Feng, R., Han, X., Liu, Q., & Ning, Yu. (2015). A credible Bayesian-based trust management scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 11(11), 678926.
75.
Zurück zum Zitat Rehman, E., Sher, M., Abbas Naqvi, S. H., Khan, K. B., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017, 1–8. Rehman, E., Sher, M., Abbas Naqvi, S. H., Khan, K. B., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017, 1–8.
76.
Zurück zum Zitat Wang, T., Zhang, G., Alam Bhuiyan, M. D. Z., Liu, A., Jia, W., & Xie, M. (2018). A novel trust mechanism based on fog computing in sensor–cloud system. Future Generation Computer Systems, 109, 573–582. Wang, T., Zhang, G., Alam Bhuiyan, M. D. Z., Liu, A., Jia, W., & Xie, M. (2018). A novel trust mechanism based on fog computing in sensor–cloud system. Future Generation Computer Systems, 109, 573–582.
77.
Zurück zum Zitat Kumar, A., Singh, K., & Khan, T. (2021). L-RTAM: Logarithm based reliable trust assessment model for WBSNs. Journal of Discrete Mathematical Sciences and Cryptography, 24(6), 1701–1716.MATH Kumar, A., Singh, K., & Khan, T. (2021). L-RTAM: Logarithm based reliable trust assessment model for WBSNs. Journal of Discrete Mathematical Sciences and Cryptography, 24(6), 1701–1716.MATH
78.
Zurück zum Zitat Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.MATH Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.MATH
79.
Zurück zum Zitat Kumar, A., Singh, K., Khan, T., Ahmadian, A., Saad, M. H. M., & Manjul, M. (2021). ETAS: An efficient trust assessment scheme for BANs. IEEE Access, 9, 83214–83233. Kumar, A., Singh, K., Khan, T., Ahmadian, A., Saad, M. H. M., & Manjul, M. (2021). ETAS: An efficient trust assessment scheme for BANs. IEEE Access, 9, 83214–83233.
80.
Zurück zum Zitat Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605–616. Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605–616.
81.
Zurück zum Zitat Fang, W., Zhang, C., Shi, Z., Zhao, Q., & Shan, L. (2016). BTRES: Beta-based trust and reputation evaluation system for wireless sensor networks. Journal of Network and Computer Applications, 59, 88–94. Fang, W., Zhang, C., Shi, Z., Zhao, Q., & Shan, L. (2016). BTRES: Beta-based trust and reputation evaluation system for wireless sensor networks. Journal of Network and Computer Applications, 59, 88–94.
82.
Zurück zum Zitat Thirunarayan, K., Anantharam, P., Henson, C., & Sheth, A. (2014). Comparative trust management with applications: Bayesian approaches emphasis. Future Generation Computer Systems, 31, 182–199. Thirunarayan, K., Anantharam, P., Henson, C., & Sheth, A. (2014). Comparative trust management with applications: Bayesian approaches emphasis. Future Generation Computer Systems, 31, 182–199.
83.
Zurück zum Zitat Song,F., & Zhao, B. (2008). Trust-based LEACH protocol for wireless sensor networks. In 2nd international conference on future generation communication and networking (pp.202–207). Song,F., & Zhao, B. (2008). Trust-based LEACH protocol for wireless sensor networks. In 2nd international conference on future generation communication and networking (pp.202–207).
84.
Zurück zum Zitat Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22–42.MathSciNetMATH Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22–42.MathSciNetMATH
85.
Zurück zum Zitat Shi, Y., & Thomas Hou, Y. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32. Shi, Y., & Thomas Hou, Y. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.
86.
Zurück zum Zitat Cheikhrouhou, O. (2016). Secure group communication in wireless sensor networks: A survey. Journal of Network and Computer Applications, 61, 115–132. Cheikhrouhou, O. (2016). Secure group communication in wireless sensor networks: A survey. Journal of Network and Computer Applications, 61, 115–132.
87.
Zurück zum Zitat Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.MATH Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.MATH
88.
Zurück zum Zitat Ishmanov, F., Kim, S., & Nam, S. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3), 7040–7061. Ishmanov, F., Kim, S., & Nam, S. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3), 7040–7061.
89.
Zurück zum Zitat Aziz, A., Singh, K., Osamy, W., & Khedr, A. M. (2019). Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. Journal of Network and Computer Applications, 126, 12–28. Aziz, A., Singh, K., Osamy, W., & Khedr, A. M. (2019). Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. Journal of Network and Computer Applications, 126, 12–28.
90.
Zurück zum Zitat Zhang, T., Yan, L., & Yang, Y. (2018). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks, 24(3), 777–797. Zhang, T., Yan, L., & Yang, Y. (2018). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks, 24(3), 777–797.
91.
Zurück zum Zitat Meng, W., Li, W., Chunhua, S., Zhou, J., & Rongxing, L. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, 7234–7243. Meng, W., Li, W., Chunhua, S., Zhou, J., & Rongxing, L. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, 7234–7243.
92.
Zurück zum Zitat Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for Ad-Hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379. Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for Ad-Hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379.
93.
Zurück zum Zitat Min, J., Kim, J., & Kwon, Y. (2012). Data compression technique for wireless sensor networks. In International conference on hybrid information technology (pp. 9–16). Springer. Min, J., Kim, J., & Kwon, Y. (2012). Data compression technique for wireless sensor networks. In International conference on hybrid information technology (pp. 9–16). Springer.
94.
Zurück zum Zitat Chen, S., Liu, J., Wang, K., & Meng, Wu. (2019). A hierarchical adaptive spatio-temporal data compression scheme for wireless sensor networks. Wireless Networks, 25(1), 429–438. Chen, S., Liu, J., Wang, K., & Meng, Wu. (2019). A hierarchical adaptive spatio-temporal data compression scheme for wireless sensor networks. Wireless Networks, 25(1), 429–438.
95.
Zurück zum Zitat Jancy, S., & Jayakumar, C. (2019). Sequence statistical code based data compression algorithm for wireless sensor network. Wireless Personal Communications, 106(3), 971–985. Jancy, S., & Jayakumar, C. (2019). Sequence statistical code based data compression algorithm for wireless sensor network. Wireless Personal Communications, 106(3), 971–985.
96.
Zurück zum Zitat Whitby, A., Jøang, A., & Indulska, J. (2004). Filtering out unfair ratings in bayesian reputation systems. In The autonomous agents and multi-agent systems, New York. Whitby, A., Jøang, A., & Indulska, J. (2004). Filtering out unfair ratings in bayesian reputation systems. In The autonomous agents and multi-agent systems, New York.
97.
Zurück zum Zitat Aziz, A., Singh, K., Osamy, W., & Khedr, A. (2019). Optimizing compressive sensing matrix using chicken swarm optimizationalgorithm. IET Wireless Sensor Systems, 9, 306–312. Aziz, A., Singh, K., Osamy, W., & Khedr, A. (2019). Optimizing compressive sensing matrix using chicken swarm optimizationalgorithm. IET Wireless Sensor Systems, 9, 306–312.
98.
Zurück zum Zitat Aziz, A., & Singh, K. (2017). Adaptive compressive sensing based routing algorithm for internet of things and wireless sensor networks. In Communication and computing systems: Proceedings of the international conference on communication and computing systems (ICCCS 2016), Gurgaon, India, 9–11 September 2016 (p. 395). CRC Press. Aziz, A., & Singh, K. (2017). Adaptive compressive sensing based routing algorithm for internet of things and wireless sensor networks. In Communication and computing systems: Proceedings of the international conference on communication and computing systems (ICCCS 2016), Gurgaon, India, 9–11 September 2016 (p. 395). CRC Press.
99.
Zurück zum Zitat Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Comm., 11(6), 38–43. Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Comm., 11(6), 38–43.
100.
Zurück zum Zitat Xiong, J., Zhao, J., & Chen, L. (2013). Efficient data gathering in wireless sensor networks based on matrix completion and compressive sensing. arXiv:1302.2244 Xiong, J., Zhao, J., & Chen, L. (2013). Efficient data gathering in wireless sensor networks based on matrix completion and compressive sensing. arXiv:​1302.​2244
101.
Zurück zum Zitat Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In 2007 international conference on wireless communications, networking and mobile computing (pp. 2684–2687). IEEE. Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In 2007 international conference on wireless communications, networking and mobile computing (pp. 2684–2687). IEEE.
Metadaten
Titel
RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNs
verfasst von
Tayyab Khan
Karan Singh
Publikationsdatum
11.01.2023
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10165-7

Weitere Artikel der Ausgabe 2/2023

Wireless Personal Communications 2/2023 Zur Ausgabe