Skip to main content
Log in

Hybrid trust and reputation management for sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sensor networks need to be lightweight in terms of computational and communication requirements, yet powerful in terms of flexibility in managing trust between nodes of heterogeneous deployments. In this paper, we propose a trust management model that can uniformly support the needs of nodes with highly diverse network roles and capabilities, by exploiting the pre-deployment knowledge on the network topology and the information flows, and by allowing for flexibility in the trust establishment process. The model is hybrid, combining aspects from certificate-based and behaviour-based approaches on trust establishment on common evaluation processes and metrics. It enables controlled trust evolution based on network pre-configuration, and controlled trust revocation through the propagation of behaviour evaluation results made available by supervision networks. The proposed model and trust metrics have been validated through simulation. The results and analysis demonstrate its effectiveness in managing the trust relationships between nodes and clusters, while distributing the computational cost of trust evaluation operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Aivaloglou, E., Gritzalis, S., & Skianis, C. (2007). Towards a flexible trust establishment framework for sensor networks. Telecommunication Systems 35(3), 207–213.

    Article  Google Scholar 

  2. Aivaloglou, E., Mitseva, A., Skianis, C., Waller, A., Prasad, N.R., & Gritzalis, S. (2007). Scalable security management for wireless sensor networks for medical scenarios. In Proceedings of the 10th international symposium on wireless personal multimedia communications (WPMC) (pp. 1014–1018).

  3. Blaze, M., Feigenbaum, J., & Lacy, J. (1996) Decentralized trust management. In Proceedings of the IEEE symposium on security and privacy (pp. 164–173). IEEE Computer Society.

  4. Bonatti, P., Duma, C., Olmedilla, D., & Shahmehri, N. (2005). An integration of reputation-based and policy-based trust management. In Proceedings of the semantic web policy workshop.

  5. Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11–12), 2413–2427.

    Article  Google Scholar 

  6. Buchegger, S., & Le Boudec, J. Y. (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In WiOpt ‘03: modeling and optimization in mobile, Ad Hoc and Wireless Networks.

  7. Davis, C. R. (2004). A localized trust management scheme for ad hoc networks. In Proceedings of the 3rd international conference on networking (ICN’04) (pp. 671–675).

  8. Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks 4(3), 1–37.

    Article  Google Scholar 

  9. Gollmann, D. (2006). Why trust is bad for security. In Electronic notes in theoretical computer science (Vol. 157, pp. 3–9). Elsevier.

  10. Grandison, T. W. A. (2006). Trust management for internet applications. Ph.D. thesis, Imperial College of Science, Technology and Medicine, University of London.

  11. Hubaux, J. P., Buttyán, L., & Capkun, S. (2001). The quest for security in mobile ad hoc networks. In Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’01) (pp. 146–155).

  12. Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. (2006). An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems 13(2):119–154.

    Article  Google Scholar 

  13. Jøsang, A., Gray, E., & Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4(2), 139–161.

    Google Scholar 

  14. Kane, K., & Browne, J. C. (2006). Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks. In Proceedings of the 5th ACM workshop on Wireless security (WiSe ’06) (pp. 105–113). ACM.

  15. Lin, C., & Varadharajan, V. (2007). A hybrid trust model for enhancing security in distributed systems. In Proceedings of the the second international conference on availability, reliability and security (ARES ’07) (pp. 35–42). IEEE Computer Society.

  16. Liu J., & Issarny, V. (2007). An incentive compatible reputation mechanism for ubiquitous computing environments. International Journal of Information Security, 6(5), 297–311.

    Article  Google Scholar 

  17. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265).

  18. Martinelli, F., & Petrocchi, M. (2007). On relating and integrating two trust management frameworks. Electronic Notes in Theoretical Computer Science, 168, 191–205.

    Article  Google Scholar 

  19. Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J. P. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE Infocom 2008.

  20. Sun, Y. L., Yu, W., Han, Z., & Liu, K. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317.

    Article  MATH  Google Scholar 

  21. Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328.

    Article  Google Scholar 

  22. Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the third IEEE international conference on pervasive computing and communications (PerCom ’05) (pp. 324–328).

  23. Yi, S., & Kravets, R. (2003). MOCA: Mobile certificate authority for wireless ad hoc networks. In Proceedings of 2nd annual PKI research workshop.

  24. Zouridaki, C., Mark, B. L., Hejmo, M., & Thomas, R. K. (2006). Robust cooperative trust establishment for MANETs. In SASN ’06: Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks, Alexandria, VA (pp. 23–34). New York: ACM.

Download references

Acknowledgments

The authors would like to thank the paper’s anonymous reviewers for their insightful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Efthimia Aivaloglou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Aivaloglou, E., Gritzalis, S. Hybrid trust and reputation management for sensor networks. Wireless Netw 16, 1493–1510 (2010). https://doi.org/10.1007/s11276-009-0216-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-009-0216-8

Keywords

Navigation