Skip to main content

Trust Models in Wireless Sensor Networks: A Survey

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads to the development of new trust models addressing the continuous data issue and also to combine the data trust and the communication trust to infer the total trust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bharathidasan, A., Ponduru, V.A.S.: Sensor Networks: An Overview, Technical Report, Dept. of Computer Science, University of California at Davis (2002)

    Google Scholar 

  2. Tubaishat, M., Madria, S.: Sensor networks: an overview. IEEE Potentials 22, 20–23 (2003)

    Article  Google Scholar 

  3. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: a Survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  4. Rajaravivarma, V., Yang, Y., Yang, T.: An Overview of Wireless Sensor Network and Applications. In: The 35th Southeastern Symposium on System Theory (2003)

    Google Scholar 

  5. Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a Wireless Sensor Network on an Active Volcano. IEEE Internet Computing (2005)

    Google Scholar 

  6. Werner-Allen, G., Johnson, J., Ruiz, M., Lees, J., Welsh, M.: Monitoring Volcanic Eruptions with a Wireless Sensor Network. In: Second European Workshop on Wireless Sensor Networks (EWSN 2005), Istanbul, Turkey (2005)

    Google Scholar 

  7. Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer Journal 37, 41–49 (2004)

    Google Scholar 

  8. Glaser, S.D.: Some Real-world Applications of Wireless Sensor Nodes. In: Proceedings of the SPIE Symposium on Smart Structures and Materials NDE, San Diego, CA, USA (2004)

    Google Scholar 

  9. Paek, J., Gnawali, O., Jang, K.-Y., Nishimura, D., Govindan, R., Caffrey, J., Wahbeh, M., Masri, S.: A Programmable Wireless Sensing System for Structural Monitoring. In: The 4th World Conference on Structural Control and Monitoring (4WCSCM), San Diego, CA (2006)

    Google Scholar 

  10. Gao, T., Greenspan, D., Welsh, M., Juang, R., Alm, A.: Vital Signs Monitoring and Patient Tracking over a Wireless Network. In: The 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005 (2005)

    Google Scholar 

  11. Yoneki, E., Bacon, J.: A Survey of Wireless Sensor Network Technologies: Research Trends and Middlewares Role, Computer Laboratory. University of Cambridge, Cambridge (2005)

    Google Scholar 

  12. Callaway, E.H.: Wireless sensor networks: architectures and protocols. CRC Press LLC, Boca Raton (2004)

    Google Scholar 

  13. Wang, Y., Attebury, G., Ramamurthy, B.: A Survey of Security Issues in Wireless Sensor Networks. IEEE Communications Surveys and Tutorials 8, 2–23 (2006)

    Google Scholar 

  14. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  16. Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer Journal 36, 103–105 (2003)

    Google Scholar 

  17. Zia, T., Zomaya, A.: Security Issues in Wireless Sensor Networks. In: International Conference on Systems and Networks Communication (ICSNC 2006), Tahiti, French Polynesia (2006)

    Google Scholar 

  18. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: The 3rd International Symposium on Information Processing in Sensor Networks, New York (2004)

    Google Scholar 

  19. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications/CRC Press (2006)

    Google Scholar 

  20. Zhou, D.: Security Issues in Ad-hoc Networks. In: The Handbook of Ad-hoc Wireless Networks, pp. 569–582. CRC Press, Inc., Boca Raton (2003)

    Google Scholar 

  21. Papadimitratos, P., Haas, Z.J.: Securing Mobile Ad-hoc Networks. In: The Handbook of Ad-hoc Wireless Networks. CRC Press LLC, Boca Raton (2003)

    Google Scholar 

  22. Zhou, L., Haas, Z.J.: Securing Ad-hoc Networks. IEEE Network Magazine (1999)

    Google Scholar 

  23. Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: The 1st International Conference on Embedded Networked Sensor Systems Los Angeles, California, USA (2003)

    Google Scholar 

  24. Karlof, C., Wagner, D.: Secure Routing in Sensor Networks: Attacks and Countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications (2003)

    Google Scholar 

  25. Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad-hoc Sensor Networks. In: 2003 ACM Workshop Wireless security (WiSe 2003), San Diego, CA, USA (2003)

    Google Scholar 

  26. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Network. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA (2004)

    Google Scholar 

  27. Perrig, A., Zewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521–534 (2002)

    Article  MATH  Google Scholar 

  28. Ye, F., Luoa, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. Selected Areas in Communications of the ACM 23 (2005)

    Google Scholar 

  29. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communications Security, Washington D.C., USA (2003)

    Google Scholar 

  30. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based Compromise Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24, 247–260 (2006)

    Article  Google Scholar 

  31. Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-based Approach. In: The 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, USA (2005)

    Google Scholar 

  32. Pirzada, A.A., McDonald, C.: Establishing Trust in Pure Ad-hoc Networks. In: The 27th Australasian Conference on Computer Science, Dunedin, New Zealand (2004)

    Google Scholar 

  33. McKnight, D.H., Chervany, N.L.: The Meanings of Trust: MIS Research Center, Carlson School of Management. University of Minnesota (1996)

    Google Scholar 

  34. Ba, S., Pavlou, P.A.: Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly 26, 243–268 (2002)

    Article  Google Scholar 

  35. Dasgupta, P.: Trust as a Commodity. In: Ingram, D. (ed.) Trust: Making and Breaking Cooperative Relations, electronic edn., pp. 49–72. Department of Sociology, University of Oxford (2000)

    Google Scholar 

  36. McKnight, D.H., Cummings, L.L., Chervany, N.L.: Trust Formation in new Organaizational Relationships: MIS Research Center, Carlson School of Management. University of Minnesota (1996)

    Google Scholar 

  37. Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43, 45–48 (2000)

    Article  Google Scholar 

  38. McKnight, D.H., Chervany, N.L.: Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model. In: The 34th Hawaii International Conference on System Sciences (2001)

    Google Scholar 

  39. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: The Tenth International Conference in Information and Knowledge Management, Atlanta, Georgia, USA (2001)

    Google Scholar 

  40. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust Management System. University of Pennsylvania, Philadelphia (1999)

    Google Scholar 

  41. Xiong, L., Liu, L.: A Reputation-based Trust Model for Peer-to-Peer E-Commerce Communities. In: IEEE International Conference on E-Commerce Technology (CEC 2003), pp. 275–284 (2003)

    Google Scholar 

  42. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Managament. In: IEEE Symposium on Security and Privacy (1996)

    Google Scholar 

  43. Chen, R., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. Sun Microsystems (2001)

    Google Scholar 

  44. Eschenauer, L.: On Trust Establishment in Mobile Ad-hoc Networks. In: Department of Electrical and Computer Engineering, vol. Master of Science, p. 45. University of Maryland, College Park (2002)

    Google Scholar 

  45. Baras, J.S., Jiang, T.: Dynamic and Distributed Trust for Mobile Ad-hoc Networks. University of Maryland, Orlando (2004)

    Google Scholar 

  46. Liu, Z., Joy, A.W., Thompson, R.A.: A Dynamic Trust Model for Mobile Ad-hoc Networks. In: The 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2004 (2004)

    Google Scholar 

  47. Davis, C.R.: A Localized Trust Management Scheme for Ad-hoc Networks. In: The 3rd International Conference on Networking, ICN 2004 (2004)

    Google Scholar 

  48. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation of Nodes- Fairness in Dynamic Ad-hoc NeTworks). In: The 3rd ACM Internationa Symposium Mobile Ad-hoc Networking & Computing (MobiHoc 2002), Lausanne, CH (2002)

    Google Scholar 

  49. Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks. In: The IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security Portoroz, Slovenia (2002)

    Google Scholar 

  50. Capra, L.: Towards a Human Trust Model for Mobile Ad-hoc Networks. In: The 2nd UK-UbiNet Workshop. Cambridge University, Cambridge (2004)

    Google Scholar 

  51. Serugendo, G.D.M.: Trust as an Interaction Mechanism for Self-Organising Systems. In: International Conference on Complex Systems (ICCS 2004). Marriott Boston Quincy, Boston (2004)

    Google Scholar 

  52. Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: The 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks, Washington, DC, USA (2004)

    Google Scholar 

  53. Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: The 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006 (2006)

    Google Scholar 

  54. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks v (2007)

    Google Scholar 

  55. Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. In: The 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005 (2005)

    Google Scholar 

  56. Crosby, G.V., Pissinou, N., Gadze, J.: A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks. In: The Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS 2006), Columbia, Maryland (2006)

    Google Scholar 

  57. Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: Trust Evaluation Model for Wireless Sensor Networks. In: The 7th International Conference on Advanced Communication Technology (ICACT 2005), Gangwon-Do, Korea (2005)

    Google Scholar 

  58. Chen, H., Wu, H., Zhou, X., Gao, C.: Reputation-based Trust in Wireless Sensor Networks. In: International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, Korea (2007)

    Google Scholar 

  59. Xiao, X.-Y., Peng, W.-C., Hung, C.-C., Lee, W.-C.: Using SensorRanks for In-Network Detection of Faulty Readings in Wireless Sensor Networks. In: The 6th ACM International Workshop on Data Engineering for Wireless and Mobile Access Beijing, China (2007)

    Google Scholar 

  60. Crosby, G.V., Pissinou, N.: Cluster-based Reputation and Trust for Wireless Sensor Networks. In: The 4th IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, Nivada (2007)

    Google Scholar 

  61. Krasniewski, M., Varadharajan, P., Rabeler, B., Bagchi, S.: TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In: The 2005 International Conference on Dependable Systems and Networks, Yokohama, Japan (2005)

    Google Scholar 

  62. Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust Management Problem in Distributed Wireless Sensor Networks. In: The 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), Sydney, Australia (2006)

    Google Scholar 

  63. Yao, Z., Kim, D., Lee, I., Kim, K., Jang, J.: A Security Framework with Trust Management for Sensor Networks. In: The 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)

    Google Scholar 

  64. Hung, K.-S., Lui, K.-S., Kwok, Y.-K.: A Trust-Based Geographical Routing Scheme in Sensor Networks. In: The IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong (2007)

    Google Scholar 

  65. Mundinger, J., Boudec, J.-Y.L.: Reputation in Self-Organized Communication Systems and Beyond. In: The 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Sytems, Pisa, Italy (2006)

    Google Scholar 

  66. Ma, R., Xing, L., Michel, H.E.: Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. In: The 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (2006)

    Google Scholar 

  67. Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 11 (2008)

    Google Scholar 

  68. Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and Localized trUst Management Scheme for Sensor Networks Security. In: The Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS). IEEE, Vancouver (2006)

    Google Scholar 

  69. Momani, M., Agbinya, J., Navarrete, G.P., Akache, M.: Trust Classification in Wireless Sensor Networks. In: The 8th International Symposium on DSP and Communication Systems (DSPCS 2005), Noosa Heads, Queensland, Australia (2005)

    Google Scholar 

  70. Momani, M., Agbinya, J., Navarrete, G.P., Akache, M.: A New Algorithm of Trust Formation in Wireless Sensor Networks. In: The 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2006), Sydney, Australia (2006)

    Google Scholar 

  71. Momani, M., Agbinya, J., Alhmouz, R., Navarrete, G.P., Akache, M.: A New Framework of Establishing Trust in Wireless Sensor Networks. In: International Conference on Computer & Communication Engineering (ICCCE 2006), Kuala Lumpur, Malaysia (2006)

    Google Scholar 

  72. Momani, M., Challa, S., Aboura, K.: Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M. (eds.) Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications. Springer, Netherlands (2007)

    Google Scholar 

  73. Momani, M., Aboura, K., Challa, S.: RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. In: The Third International Conference on Intelligent Sensors, Sensor Networks and Information, Melbourne, Australia (2007)

    Google Scholar 

  74. Momani, M., Challa, S.: GTRSSN: Gaussian Trust and Reputation System for Sensor Networks. In: International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007). University of Bridgeport (2007)

    Google Scholar 

  75. Momani, M., Challa, S., Alhmouz, R.: Can we Trust Trusted Nodes in Wireless Sensor Networks? In: The International Conference on Computer and Communication Engineering (ICCCE 2008), Kuala Lumpur, Malaysia (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Momani, M. (2010). Trust Models in Wireless Sensor Networks: A Survey. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics