Abstract
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks (WSNs), because sensors are deployed for long periods in hostile environments where it is possible for an adversary to physically take over a sensor and obtain access to the cryptographic keys stored in the sensor’s internal memory. Thus, reputation-based trust systems are employed to detect abnormal activities and enhance the trustworthiness among sensors. Unfortunately, existing reputation-based trust systems for WSNs do not investigate the robustness against WSN-related or reputation-related attacks. This paper provides a comprehensive analysis for current reputation-based trust systems by surveying the current “state-of-the-art” work in this area.
Chapter PDF
Similar content being viewed by others
Keywords
References
Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Sensor Networks Architectures and Protocols. Prentice Hall PTR, Upper Saddle River (2004)
Guimarães, G., Souto, E., Sadok, D.F.H., Kelner, J.: Evaluation of Security Mechanisms in Wireless Sensor Networks. In: Proceedings of the International Conference on Wireless Technologies/High Speed Networks/Multimedia Communications Systems/Sensor Networks, ICW/ICHSN/ICMCS/SENET, Montreal, Canada, pp. 428–433 (2005)
Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report, CU-CS-990-05. University of Colorado at Boulder - Department of Computer Science (2005)
Yan, Z., Zhang, P., Virtanen, T.: Trust Evaluation Based Security Solution in Ad hoc Networks (2003), http://research.nokia.com/publications/trust_evaluation_based_security_solution_ad_hoc_networks
Dasgupta, P.: Trust as a Commodity. In: Gambetta, D. (ed.) Trust Making and Breaking Cooperative Relations, 3rd edn., pp. 49–72. Basil Blackwell Publishing Ltd., Oxford (2000)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Keser, C.: Experimental games for the design of reputation management systems. IBM Systems Journal 42(3), 498–506 (2003)
Ismail, R., Jøsang, A.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce (2002)
Golbeck, J.A.: Computing and applying trust in web-based social networks. Ph.D. dissertation, College Park, MD, USA (2005), The thesis is retrieved May 24, 2012
Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.J.: Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 20(11), 1698–1712 (2009)
Alzaid, H., Foo, E., Nieto, J.G.: RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. In: Proceedings of the 9th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2008, Dunedin, New Zealand, pp. 419–424 (2008)
Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31(18), 4343–4351 (2008)
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2002, Lausanne, Switzerland, pp. 226–236 (2002)
Srinivasan, A., Li, F., Wu, J.: A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. In: Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2008, Beijing, China, pp. 364–369 (2008)
Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: 2nd International Symposium on Dependable Autonomic and Secure Computing, DASC 2006, Indianapolis, Indiana, USA, pp. 277–283 (2006)
Xiao, D., Feng, J., Zhang, H.: A formal reputation system for trusting wireless sensor network. Wuhan University Journal of Natural Sciences 13(2), 173–179 (2008)
Yao, Z., Kim, D., Doh, Y.: PLUS: parameterised localised trust management-based security framework for sensor networks. IJSNET 3(4), 224–236 (2008)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)
Michiardi, P., Molva, R.: Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. European Wireless Conference (2002)
Kifayat, K., Merabti, M., Shi, Q., Llewellyn-Jones, D.: Security in Wireless Sensor Networks. In: Stamp, M., Stavroulakis, P. (eds.) Handbook of Information and Communication Security, ch. 26, pp. 513–552. Springer, Heidelberg (2010)
Alzaid, H., Foo, E., Nieto, J.M.G.: Secure data aggregation in wireless sensor network: A survey: In: Proceedings of the 6th Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, pp. 93–105 (2008)
Ismail, R.: Security of Reputation Systems. Ph.D. dissertation, Queensland University of Technology, Brisbane, Australia (2004), The thesis is retrieved May 24, 2012
Jøsang, A., Golbeck, J.: Challenges for Robust Trust and Reputation Systems. In: Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009), Saint Malo, France, pp. 1–6 (2009)
Feldman, M., Chuang, J.: Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exchanges 5(4), 41–50 (2005)
Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communications and Multimedia Security, vol. 228, pp. 107–121 (2002)
Boukerche, A., Xu, L., El-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11-12), 2413–2427 (2007)
Jøsang, A., Luo, X., Chen, X.: Continuous Ratings in Discrete Bayesian Reputation Systems. In: Proceedings of the 2nd Joint iTrust and PST Conference on Privacy, Trust Management and Security, Saint Malo, France, pp. 151–166 (2008)
Bernoulli, D.: Exposition of a New Theory on the Measurement of Risk. Econometrica 22(1), 23–36 (1954), http://dx.doi.org/10.2307/1909829
Morgenstern, O., Neumann, J.V.: Theory of Games and Economic Behavior. Princeton University Press, New York (1980)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MOBICOM, Boston, Massachusetts, United States, pp. 255–265 (2000)
Chen, H., Wu, H., Hu, J., Gao, C.: Agent-Based Trust Management Model for Wireless Sensor Networks. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, MUE 2008, Busan, Korea, pp. 150–154 (2008)
Chen, H.: Task-based Trust Management for Wireless Sensor Networks. International Journal of Security and its Applications 3(2), 21–26 (2009)
Özdemir, S.: Functional Reputation Based Data Aggregation for Wireless Sensor Networks. In: Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, pp. 592–597 (2008)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks 4(3), 1–37 (2008)
Chen, H., Wu, H., Zhou, X., Gao, C.: Reputation-based Trust in Wireless Sensor Networks. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, Seoul, Korea, pp. 603–607 (2007)
Sen, J., Krishna, S.: An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks. CoRR. abs/1111.0380 (2011)
Crosby, G.V., Hester, L., Pissinou, N.: Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal on Network Security 12(2), 107–117 (2011)
Perez-Toro, C., Panta, R., Bagchi, S.: RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network. In: Proceedings of the 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks, SECON, Boston, Massachusetts, USA, pp. 1–9 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Alzaid, H., Alfaraj, M., Ries, S., Jøsang, A., Albabtain, M., Abuhaimed, A. (2013). Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds) Trust Management VII. IFIPTM 2013. IFIP Advances in Information and Communication Technology, vol 401. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38323-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-38323-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38322-9
Online ISBN: 978-3-642-38323-6
eBook Packages: Computer ScienceComputer Science (R0)