Abstract
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads to the development of new trust models addressing the continuous data issue and also to combine the data trust and the communication trust to infer the total trust.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bharathidasan, A., Ponduru, V.A.S.: Sensor Networks: An Overview, Technical Report, Dept. of Computer Science, University of California at Davis (2002)
Tubaishat, M., Madria, S.: Sensor networks: an overview. IEEE Potentials 22, 20–23 (2003)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: a Survey. Computer Networks 38, 393–422 (2002)
Rajaravivarma, V., Yang, Y., Yang, T.: An Overview of Wireless Sensor Network and Applications. In: The 35th Southeastern Symposium on System Theory (2003)
Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a Wireless Sensor Network on an Active Volcano. IEEE Internet Computing (2005)
Werner-Allen, G., Johnson, J., Ruiz, M., Lees, J., Welsh, M.: Monitoring Volcanic Eruptions with a Wireless Sensor Network. In: Second European Workshop on Wireless Sensor Networks (EWSN 2005), Istanbul, Turkey (2005)
Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer Journal 37, 41–49 (2004)
Glaser, S.D.: Some Real-world Applications of Wireless Sensor Nodes. In: Proceedings of the SPIE Symposium on Smart Structures and Materials NDE, San Diego, CA, USA (2004)
Paek, J., Gnawali, O., Jang, K.-Y., Nishimura, D., Govindan, R., Caffrey, J., Wahbeh, M., Masri, S.: A Programmable Wireless Sensing System for Structural Monitoring. In: The 4th World Conference on Structural Control and Monitoring (4WCSCM), San Diego, CA (2006)
Gao, T., Greenspan, D., Welsh, M., Juang, R., Alm, A.: Vital Signs Monitoring and Patient Tracking over a Wireless Network. In: The 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005 (2005)
Yoneki, E., Bacon, J.: A Survey of Wireless Sensor Network Technologies: Research Trends and Middlewares Role, Computer Laboratory. University of Cambridge, Cambridge (2005)
Callaway, E.H.: Wireless sensor networks: architectures and protocols. CRC Press LLC, Boca Raton (2004)
Wang, Y., Attebury, G., Ramamurthy, B.: A Survey of Security Issues in Wireless Sensor Networks. IEEE Communications Surveys and Tutorials 8, 2–23 (2006)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)
Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47, 53–57 (2004)
Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer Journal 36, 103–105 (2003)
Zia, T., Zomaya, A.: Security Issues in Wireless Sensor Networks. In: International Conference on Systems and Networks Communication (ICSNC 2006), Tahiti, French Polynesia (2006)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: The 3rd International Symposium on Information Processing in Sensor Networks, New York (2004)
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications/CRC Press (2006)
Zhou, D.: Security Issues in Ad-hoc Networks. In: The Handbook of Ad-hoc Wireless Networks, pp. 569–582. CRC Press, Inc., Boca Raton (2003)
Papadimitratos, P., Haas, Z.J.: Securing Mobile Ad-hoc Networks. In: The Handbook of Ad-hoc Wireless Networks. CRC Press LLC, Boca Raton (2003)
Zhou, L., Haas, Z.J.: Securing Ad-hoc Networks. IEEE Network Magazine (1999)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: The 1st International Conference on Embedded Networked Sensor Systems Los Angeles, California, USA (2003)
Karlof, C., Wagner, D.: Secure Routing in Sensor Networks: Attacks and Countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications (2003)
Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad-hoc Sensor Networks. In: 2003 ACM Workshop Wireless security (WiSe 2003), San Diego, CA, USA (2003)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Network. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA (2004)
Perrig, A., Zewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521–534 (2002)
Ye, F., Luoa, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. Selected Areas in Communications of the ACMÂ 23 (2005)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communications Security, Washington D.C., USA (2003)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based Compromise Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24, 247–260 (2006)
Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-based Approach. In: The 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, USA (2005)
Pirzada, A.A., McDonald, C.: Establishing Trust in Pure Ad-hoc Networks. In: The 27th Australasian Conference on Computer Science, Dunedin, New Zealand (2004)
McKnight, D.H., Chervany, N.L.: The Meanings of Trust: MIS Research Center, Carlson School of Management. University of Minnesota (1996)
Ba, S., Pavlou, P.A.: Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly 26, 243–268 (2002)
Dasgupta, P.: Trust as a Commodity. In: Ingram, D. (ed.) Trust: Making and Breaking Cooperative Relations, electronic edn., pp. 49–72. Department of Sociology, University of Oxford (2000)
McKnight, D.H., Cummings, L.L., Chervany, N.L.: Trust Formation in new Organaizational Relationships: MIS Research Center, Carlson School of Management. University of Minnesota (1996)
Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43, 45–48 (2000)
McKnight, D.H., Chervany, N.L.: Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model. In: The 34th Hawaii International Conference on System Sciences (2001)
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: The Tenth International Conference in Information and Knowledge Management, Atlanta, Georgia, USA (2001)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust Management System. University of Pennsylvania, Philadelphia (1999)
Xiong, L., Liu, L.: A Reputation-based Trust Model for Peer-to-Peer E-Commerce Communities. In: IEEE International Conference on E-Commerce Technology (CEC 2003), pp. 275–284 (2003)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Managament. In: IEEE Symposium on Security and Privacy (1996)
Chen, R., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. Sun Microsystems (2001)
Eschenauer, L.: On Trust Establishment in Mobile Ad-hoc Networks. In: Department of Electrical and Computer Engineering, vol. Master of Science, p. 45. University of Maryland, College Park (2002)
Baras, J.S., Jiang, T.: Dynamic and Distributed Trust for Mobile Ad-hoc Networks. University of Maryland, Orlando (2004)
Liu, Z., Joy, A.W., Thompson, R.A.: A Dynamic Trust Model for Mobile Ad-hoc Networks. In: The 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2004 (2004)
Davis, C.R.: A Localized Trust Management Scheme for Ad-hoc Networks. In: The 3rd International Conference on Networking, ICN 2004 (2004)
Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation of Nodes- Fairness in Dynamic Ad-hoc NeTworks). In: The 3rd ACM Internationa Symposium Mobile Ad-hoc Networking & Computing (MobiHoc 2002), Lausanne, CH (2002)
Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks. In: The IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security Portoroz, Slovenia (2002)
Capra, L.: Towards a Human Trust Model for Mobile Ad-hoc Networks. In: The 2nd UK-UbiNet Workshop. Cambridge University, Cambridge (2004)
Serugendo, G.D.M.: Trust as an Interaction Mechanism for Self-Organising Systems. In: International Conference on Complex Systems (ICCS 2004). Marriott Boston Quincy, Boston (2004)
Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: The 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks, Washington, DC, USA (2004)
Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: The 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006 (2006)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks v (2007)
Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. In: The 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005 (2005)
Crosby, G.V., Pissinou, N., Gadze, J.: A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks. In: The Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS 2006), Columbia, Maryland (2006)
Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: Trust Evaluation Model for Wireless Sensor Networks. In: The 7th International Conference on Advanced Communication Technology (ICACT 2005), Gangwon-Do, Korea (2005)
Chen, H., Wu, H., Zhou, X., Gao, C.: Reputation-based Trust in Wireless Sensor Networks. In: International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, Korea (2007)
Xiao, X.-Y., Peng, W.-C., Hung, C.-C., Lee, W.-C.: Using SensorRanks for In-Network Detection of Faulty Readings in Wireless Sensor Networks. In: The 6th ACM International Workshop on Data Engineering for Wireless and Mobile Access Beijing, China (2007)
Crosby, G.V., Pissinou, N.: Cluster-based Reputation and Trust for Wireless Sensor Networks. In: The 4th IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, Nivada (2007)
Krasniewski, M., Varadharajan, P., Rabeler, B., Bagchi, S.: TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In: The 2005 International Conference on Dependable Systems and Networks, Yokohama, Japan (2005)
Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust Management Problem in Distributed Wireless Sensor Networks. In: The 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), Sydney, Australia (2006)
Yao, Z., Kim, D., Lee, I., Kim, K., Jang, J.: A Security Framework with Trust Management for Sensor Networks. In: The 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)
Hung, K.-S., Lui, K.-S., Kwok, Y.-K.: A Trust-Based Geographical Routing Scheme in Sensor Networks. In: The IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong (2007)
Mundinger, J., Boudec, J.-Y.L.: Reputation in Self-Organized Communication Systems and Beyond. In: The 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Sytems, Pisa, Italy (2006)
Ma, R., Xing, L., Michel, H.E.: Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. In: The 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (2006)
Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks. ACM Transactions on Information and System Security (TISSEC)Â 11 (2008)
Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and Localized trUst Management Scheme for Sensor Networks Security. In: The Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS). IEEE, Vancouver (2006)
Momani, M., Agbinya, J., Navarrete, G.P., Akache, M.: Trust Classification in Wireless Sensor Networks. In: The 8th International Symposium on DSP and Communication Systems (DSPCS 2005), Noosa Heads, Queensland, Australia (2005)
Momani, M., Agbinya, J., Navarrete, G.P., Akache, M.: A New Algorithm of Trust Formation in Wireless Sensor Networks. In: The 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2006), Sydney, Australia (2006)
Momani, M., Agbinya, J., Alhmouz, R., Navarrete, G.P., Akache, M.: A New Framework of Establishing Trust in Wireless Sensor Networks. In: International Conference on Computer & Communication Engineering (ICCCE 2006), Kuala Lumpur, Malaysia (2006)
Momani, M., Challa, S., Aboura, K.: Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M. (eds.) Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications. Springer, Netherlands (2007)
Momani, M., Aboura, K., Challa, S.: RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. In: The Third International Conference on Intelligent Sensors, Sensor Networks and Information, Melbourne, Australia (2007)
Momani, M., Challa, S.: GTRSSN: Gaussian Trust and Reputation System for Sensor Networks. In: International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007). University of Bridgeport (2007)
Momani, M., Challa, S., Alhmouz, R.: Can we Trust Trusted Nodes in Wireless Sensor Networks? In: The International Conference on Computer and Communication Engineering (ICCCE 2008), Kuala Lumpur, Malaysia (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Momani, M. (2010). Trust Models in Wireless Sensor Networks: A Survey. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)