Abstract
Wireless sensor networks (WSNs) are susceptible to many security threats and are specifically prone to physical node capture in which the adversary can easily launch the so-called insider attacks such as node compromise, bypassing the traditional security mechanisms based on cryptography primitives. So, the compromised nodes can be modified to misbehave and disrupt the entire network and can successfully perform the authentication process with their neighbors, which have no way to distinguish fraudulent nodes from trustworthy ones. Trust and reputation systems have been recently suggested as a powerful tools and an attractive complement to cryptography-based schemes in securing WSNs. They provide ability to detect and isolate both faulty and malicious nodes. Considerable research has been done on modeling and managing trust and reputation. However, trust topic issue in WSNs remains an open and challenging field. In this paper, we propose a Risk-aware Reputation-based Trust (RaRTrust) model for WSNs. Our novel framework uses both reputation and risk to evaluate trustworthiness of a sensor node. Risk evaluation is used to deal with the dramatic spoiling of nodes, which makes RaRTrust robust to on–off attack and differ from other trust models based only on reputation. This paper contributes to model the risk as opinion of short-term trustworthiness combining with traditional reputation evaluation to derive trustworthiness in WSNs.
Similar content being viewed by others
References
Akyldiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
Louazani, A., Sekhri, L., & Kechar, B. (2014). A security scheme against wormhole attack in MAC layer for delay sensitive wireless sensor networks. International Journal of Information Technology and Computer Science (IJITCS), 6(12), 1–10.
Louazani, A., Sekhri, L., & Kechar, B. (2013). A time petri net model for wormhole attack detection in wireless sensor networks. In 4th IEEE technical co-sponsored international conference on smart communications in network technologies (SaCoNeT).
Zahariadis, T., Trakadas, P., Leligou, H., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–825.
Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communication of the ACM, 47(6), 53–57.
Labraoui, N., Gueroui, M., Aliouat, M., & Zia, T. (2011). Data aggregation security challenge in wireless sensor networks, a survey. Ad hoc & Sensor Networks International Journal, 12(3–4), 295–324.
Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.
Labraoui, N., Gueroui, M., Aliouat, M., & Petit, J. (2013). Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication Systems, 54(1), 3–17.
Dhulipala, V. R. S., Karthik, N., & Chandrasekaran, R. M. (2013). A novel heuristic approach based trustworthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.
Shaikh, R. A., Jameel, H., DAuriol, B. J., Lee, H. J., Lee, S. Y., & Song, Y. J. (2009). Group based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(1), 1698–1712.
Alzaid, H., Alfaraj, M., Ries, S., Jsang, A., Albabtain, M., & Abuhaimed, A. (2013). Reputation-based trust systems for wireless sensor networks: A comprehensive review. IFIP Advances in Information and Communication Technology, 401, 66–82.
Ganeriwal, S., & Srivastava, M. (2004). Reputation-based framework for high integrity sensor networks. In 2nd ACM workshop on Security of ad hoc and sensor networks (SASN).
Jsang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Conference on Electronic Commerce (Bled).
ElSalamouny, E., Krukow, K., & Sassone, V. (2009). An analysis of the exponential decay principle in probabilistic trust models. Theoretical Computer Science, 410(41), 4067–4084.
Yanli, Y., Keqiu, L., & Ping, L. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.
Yao, Z., Kim, D., Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In IEEE international conference on mobile ad hoc and sensor systems (MASS) (pp. 437–446).
Boukerche, A., Li, X., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Commununications, 30(1), 2413–2427.
Daojing, H., Chun, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions of Information Technology in Biomedecine, 16(1), 623–632.
Guangjie, H., Jinfang, J., Lei, S., Jianwei, N., & Han-Chieh, C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.
Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618.
Whitby, A., Josang, A., & Indulska, J. (2004). Filtering out unfair ratings in Bayesian reputation systems. In 3rd international joint conference on autonomous agenst and multi agent systems (pp. 106–117).
Weng, J., Miao, C., & Goh, A. (2006). An entropy-based approach to protecting rating systems from unfair testimonies. IEICE Transactions on Information and Systems, E89D(9), 2502–2511.
Feng, J., Zhang, Y., & Wang, H. (2010). A trust management model based on bi-evaluation in p2p networks. IEICE Transactions on Information and Systems, 93(1), 466–472.
Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions of Information Forensics Security, 8(1), 924–993.
Sun, Y., Han, Z., & Liu, K. J. R. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communication Magazine, 46(2), 112–119.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Labraoui, N., Gueroui, M. & Sekhri, L. A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks. Wireless Pers Commun 87, 1037–1055 (2016). https://doi.org/10.1007/s11277-015-2636-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2636-3