Skip to main content
Log in

MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Trust is an important factor in Wireless Sensor Networks in order to assess the believability of the produced data. Due to the limited computational power and energy resources of the wireless sensor networks, it is a challenge to maintain trust while using the energy efficiently. Previously we developed a trust enhancing one-hop architecture called ProTru. In order to make the architecture more efficient for multi-hop WSNs, we developed a two-hop version of our previous architecture called MultiProTru. In this architecture routing is done based on the trust values of the cluster heads. One other difference of MultiProTru is to find untrusted data we use Kalman filtering approach whereas in ProTru uses Random Sample Consensus algorithm. We compared the effectiveness of MultiProTru with ProTru, ProTruKa and a current trust architecture called an Efficient Distributed Trust Model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Eschenauer L, Gligor V, Baras J (2004) On trust establishment in mobile ad-hoc networks. In: Security Protocols. Springer, pp 47–66

  2. Dogan G (2013) Protru: Leveraging provenance to enhance network trust in a wireless sensor network. City University of New York

  3. Rani U, Sundaram S (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8(2)

  4. Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(3):15

    Google Scholar 

  5. Marzi H, Li M (2013) An enhanced bio-inspired trust and reputation model for wireless sensor network. Proc Comput Sci 19:1159–1166

    Article  Google Scholar 

  6. Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237

    Article  Google Scholar 

  7. Liu X, Baras JS (2014) Using trust in distributed consensus with adversaries in sensor and other networks. In: 2014 17th International Conference on Information Fusion (FUSION). IEEE, pp 1–7

  8. Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, pp 277–283

  9. Dai C, Lin D, Bertino E, Kantarcioglu M (2008) Trust evaluation of data provenance. Technical Report, Technical Report CERIAS TR 2001-147, Purdue University

  10. Lim HS, Moon YS, Bertino E (2009) Research issues in data provenance for streaming environments. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. ACM, p 58–62

  11. Lim HS, Moon YS, Bertino E (2010) Assessing the Trustworthiness of Streaming Data. Technical Report, Technical Report TR 2010-09, CERIAS, 2010

  12. Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu YC (2005) Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks. In: International Conference on Dependable Systems and Networks. IEEE, pp 672–681

  13. Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 2006. DSSNS 2006. IEEE , p 10–pp

  14. Hur J, Lee Y, Yoon H, Choi D, Jin S (2005) Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005, volume 1. IEEE, pp 491–496

  15. Dogan G, Brown T, Govindan K, Khan MMH, Abdelzaher T, Mohapatra P, Cho JH (2011) Evaluation of network trust using provenance based on distributed local intelligence. In: Military Communications Conference. IEEE

  16. Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE, pp 603–607

  17. Xiao XY, Peng WC, Hung CC, Lee WC (2007) Using sensorranks for in-network detection of faulty readings in wireless sensor networks. In: proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access. ACM , pp 1–8

  18. Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: International Conference on Performance, Computing, and Communications. IEEE, pp 463–469

  19. Srinivasan A, Li F, Wu J (2008) A novel cds-based reputation monitoring system for wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS’08. IEEE, pp 364–369

  20. Momani M, Aboura K, Challa S (2007) Rbatmwsn: Recursive bayesian approach to trust management in wireless sensor networks. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, pp 347– 352

  21. Ozdemir S (2008) Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput Commun 31(17):3941–3953

    Article  Google Scholar 

  22. Shaikh RA, Jameel H, Lee S, Rajput S, Song YJ (2006) Trust management problem in distributed wireless sensor networks. In: 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2006. Proceedings. IEEE, p 411–414

  23. Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(11–12):2413–2427

    Article  Google Scholar 

  24. Li ZY, Liu L, Chen RL, Bi JL (2015) An adaptive secure communication framework for mobile peer-to-peer environments using bayesian games. Peer-to-Peer Networking and Applications:1–15

  25. Han Q, Wen H, Ma T, Wu B (2015) Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Networking and Applications:1–11

  26. Wu X (2012) A distributed trust management model for mobile p2p networks. Peer-to-peer Netw Appl 5 (2):193–204

    Article  MathSciNet  Google Scholar 

  27. Welch G, Bishop G (2006) An introduction to the kalman filter. 2006. University of North Carolina: Chapel Hill, North Carolina, US

    Google Scholar 

  28. Fernández-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. IEEE, pp 25–30

  29. Cheney J, Chiticariu L, Tan WC (2009) Provenance in databases: Why, how, and where. Found Trends Databases 1(4):379–474

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gulustan Dogan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dogan, G., Avincan, K. MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks. Peer-to-Peer Netw. Appl. 10, 278–291 (2017). https://doi.org/10.1007/s12083-016-0446-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0446-3

Keywords

Navigation