Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution


Compared with the encryption and the authentication which can prevent the external attacks, the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network (WSN). The reputation time-varying (RTV) attacks are internal attacks. In the reputation time-varying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Time-window-based Resilient Trust Management Scheme (TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes’ reputation value, meanwhile, the control factor F c and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes’ reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.

This is a preview of subscription content, log in to check access.


  1. 1

    Guo M J, Liu Y H, Yu H B, et al. An overview of smart city in China. China Commun, 2016, 13: 203–211

  2. 2

    Xiong Z, Sheng H, Rong W G, et al. Intelligent transportation systems for smart cities: a progress review. Sci China Inf Sci, 2012, 55: 2908–2914

  3. 3

    Mois G, Sanislav T, Folea S C. A cyber-physical system for environmental monitoring. IEEE Trans Instrum Meas, 2016, 65: 1463–1471

  4. 4

    Yang Y, Zhao C, Yao S, et al. Delay performance of network-coding-based epidemic routing. IEEE Trans Veh Technol, 2016, 65: 3676–3684

  5. 5

    Chen W, Jiang X R, Tang Z B, et al. Context-based global multi-class semantic image segmentation by wireless multimedia sensor networks. Artif Intell Rev, 2015, 43: 579–591

  6. 6

    Tao X F, Xu X D, Cui Q M. An overview of cooperative communications. IEEE Commun Mag, 2012, 50: 65–71

  7. 7

    Yang Y, Zhang W X, Wei K, et al. Power reduction for mobile devices by deploying low-power base stations. IET Commun, 2014, 8: 3372–3380

  8. 8

    Saurabh G, Mani B S. Reputation-based framework for high integrity sensor network. In: Proceedings of ACM Workshop on Security of ad hoc and Sensor Network. New York: ACM, 2004. 66–77

  9. 9

    Yang G, Yin G S, Yang W, et al. A reputation-based model for malicious node detection in WSNs (in Chinese). J Harbin Inst Technol, 2009, 41: 158–162

  10. 10

    Jiang J F, Han G J, Wang F, et al. An efficient distributed trust model for wireless sensor network. IEEE Trans Parall Distrib Syst, 2015, 26: 1228–1337

  11. 11

    He D J, Chen C, Chan S, et al. A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inform Technol Biomed, 2012, 16: 1164–1175

  12. 12

    Meghanathan N. A distributed trust evaluation model for wireless mobile sensor networks. In: Proceedings of International Conference on Information Technology: New Generations (ITNG), Las Vegas, 2014. 186–191

  13. 13

    UmaRani V, Sundaram K S, Jayashree D. Enhanced beta trust model in wireless sensor networks. In: Proceedings of International Conference on Information Communication and Embedded Systems (ICICES), Tamil Nadu, 2016. 1–5

  14. 14

    Wang N, Liu D Q. Trust model based on changeable sampling frequency for wireless sensor network. In: Proceedings of IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, 2016. 1–4

  15. 15

    Xia H, Jia Z P, Sha E H-M. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inform Secur, 2014, 8: 88–103

  16. 16

    Gheorghe L, Rughinis R, Tataroiu R. Adaptive trust management protocol based on intrusion detection for wireless sensor network. In: Proceedings of RoEduNet International Conference on Networking in Education and Research, Constanta, 2013. 1–7

  17. 17

    Fang F, Li J F, Li J. A reputation management scheme based on multi-factor in WSN. In: Proceeding of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). Shenyang, 2013. 3843–3848

  18. 18

    Labraoui N. A reliable trust management scheme in wireless sensor networks. In: Proceedings of IEEE International Symposium on Programming and Systems (ISPS), Algiers, 2015. 1–6

  19. 19

    Su W G, Liao Y. A jury-based trust management mechanism in distributed cognitive radio networks. China Commun, 2015, 12: 119–126

  20. 20

    Ren Y, Zadorozhny V I, Oleshchuk V A, et al. A novel approach to trust management in unattended wireless sensor networks. IEEE Trans Mob Comput, 2014, 13: 1409–1423

  21. 21

    Reshmi V, Sajitha M. Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks. In: Proceeding of IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015. 1–6

  22. 22

    Zhu C S, Nicanfar H, Leung V C M, et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inform Forens Secur, 2015, 10: 118–131

  23. 23

    Fang W D, Zhang C L, Shi Z D, et al. BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl, 2016, 59: 88–94

  24. 24

    Shafer G. A Mathematical Theory of Evidence. Princeton: Princeton University, 1976

  25. 25

    Jøsang A. A logic for uncertain probabilities. Int J Uncertain Fuzz Knowl-Based Syst, 2011, 9: 279–311

Download references


This work was partially supported by National Natural Science Foundation of China (Grant No. 61471346), Shanghai Natural Science Foundation (Grant No. 17ZR1429100), International Science and Technology Cooperation Program of China (Grant No. 2014DFA11640), National Program of Internation- al Science and Technology Cooperation (Grant No. 2014DFE10160), National Science and Technology Major Project (Grant No. 2014ZX03005001), and National Natural Science Foundation and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon (Grant No. U1510115).

Author information

Correspondence to Wuxiong Zhang.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Fang, W., Zhang, W., Yang, Y. et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. China Inf. Sci. 60, 040305 (2017).

Download citation


  • wireless sensor network (WSN)
  • reputation time-varying attack
  • trust value
  • trust management
  • time window