Skip to main content

Advertisement

Log in

Self-Recommendation Mechanism in Trust Calculation Among Nodes in WSN

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper proposes a node self-recommendation mechanism which is effective in trust calculation model in wireless sensor networks (WSNs). The mechanism has little practical sense to cable and wireless network among which nodes’ resources, especially energy, are almost unlimited; furthermore it may bring some security risk to networks on the contrary. But as to WSNs where nodes’ resources are strictly limited, a node can express its intension of participating communication to its neighbors by using the mechanism according to its current running state and predefined strategies. This mechanism is useful to save nodes’ energy, balance network load and prolong network lifetime ultimately. The paper focuses on self-recommendation value expression, calculation and synthesis method. Application method of the mechanism is also discussed. Simulation results show that using trust calculation model cooperatively with self-recommendation mechanism can protect low energy nodes effectively and balance energy consumption among adjacent nodes without weakening malicious node identification function of the trust model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Freudenthal, E., Pesin, T., Port, L., Keenan, K., & Karamcheti, V. (2002). dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the. 22nd international conference on distributed computing systems (pp. 411–420). IEEE.

  2. Ryutov, T., & Neuman, C. (2007). Trust based approach for improving data reliability in industrial sensor networks. Trust Management (pp. 349–365). Berlin: Springer.

    Google Scholar 

  3. Lu, Y., Lin, K., & Li, K. (2012) Trust evaluation model against insider attack in wireless sensor networks. In International conference on cloud and green computing (pp. 319–326). IEEE.

  4. Ruohomaa, S., & Kutvonen, L. (2005). Trust management survey. Trust management (pp. 77–92). Berlin: Springer.

    Google Scholar 

  5. Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.

    Article  Google Scholar 

  6. Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30(11), 2411–2427.

    Google Scholar 

  7. Ganeriwal, S., Srivastava. M. B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 66–77).

  8. Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., & Caredei, M. (2008). Reputation and trust based system for ad hoc and sensor networks. In A. Boukerche (Ed.), Algorithms and protocols for wireless ad-hoc and sensor netowrks. New Jersey: Wiley.

    Google Scholar 

  9. Chen, H., Wu, H., Zhou, X., & Gao, C. (2007). Agent-based trust model in wireless sensor networks. In 8th ACIS international conference software engineering, artificial intelligence parallel/distribute computing (pp. 119–124).

  10. Liu, S., Pang, L., Pei, Q., Ma, H., & Peng, Q. (2009) Distributed event-triggered trust management for wirless sensor networks. In 5th international conference on information assurance and security.

  11. Qiming, H., & Haiyan, N. (2009). Reputation computing for wireless sensor networks based on dirichlet distribution. Chinese Journal of Sensors and Actuators, 22(4), 526–529.

    Google Scholar 

  12. Wen, T., & Zhong, C. (2003). Research of subjective trust management model based on the fuzzy set theory. Journal of Software, 14(8), 1401–1407.

    MATH  Google Scholar 

  13. Tang Wen, H., & Jianbin, C. Z. (2005). Research on a fuzzy logic-based subjective trust management model. Journal of Computer Research and Development, 42(10), 1654–1659.

    Article  Google Scholar 

  14. Cheng, J., Wang, H., Bao, C., & Bao, H. (2012). Trust evaluation model based on fuzzy logic in wireless sensor networks. Measurement and Control Technology, 31(4), 13–16.

    Google Scholar 

  15. Jian, C., Feng Renjian, X., & Xianfeng, W. J. (2009). Trust evaluation model based on d-s evidence theory in wireless sensor network. Chinese Journal of Sensors and Actuators, 22(12), 1802–1807.

    Google Scholar 

  16. Michiardi, P., & Molva, R. (2002) CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, 9.

  17. Yau, P. W., & Mitchell, C. J. (2003) Reputation methods for routing security for mobile ad hoc networks. In Proceedings of joint IST workshop on mobile fitire and symposiim on trends in communications (pp. 130–137).

  18. Bin, Ma., & Xianzhong, X. (2010). Cloud trust for wireless sensor networks. Computer Science, 37(3), 128–132.

    Google Scholar 

  19. Zhikui, C., & Bingjie, Z. (2010). Trust evaluation for wireless sensor networks based on trust-cloud. Journal of Computer Applications, 30(12), 3346–3348.

    Google Scholar 

  20. Vamsi, P. R., & Kant, K. (2014). Performance analysis of trust based geographic routing protocols for wireless sensor networks. In International conference on parallel, distributed and grid computing (PDGC) (pp. 318–323). IEEE.

  21. Ramalingam, L., & Audithan, S. (2014). Trust based cluster head selection algorithm for wireless sensor network. In International conference on current trends in engineering and technology (ICCTET) (pp. 453–457). IEEE.

  22. Alkalbani, A. S., Tap, A. M., & Mantoro, T. (2013). Energy consumption evaluation in trust and reputation models for wireless sensor networks. In International conference on information and communication technology for the Muslim World (ICT4 M) (pp. 1–6). IEEE.

  23. Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., & Teo, J. C. M. (2015). Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Transactions on Information Forensics and Security, 10(3), 613–625.

    Article  Google Scholar 

  24. Tianhua, W., & Na, W. (2014). A trust model for wireless sensor networks based on multi-factors. In International conference on computer science & education (ICCSE) (pp. 407–410). IEEE.

  25. Xiang, G., Jianlin, Q., Zhan, G., & Jin, W. (2012). A kind of trust calculation model among nodes in wireless sensor networks. ICIC Express Letters, 6(7), 1821–1826.

    Google Scholar 

Download references

Acknowledgements

This work is supported by Jiangsu Overseas Research & Training Program for University Prominent Young &Middle-aged Teachers and Presidents Project, and in part by the Natural Science Foundation of the Jiangsu Higher Education Institutions (15KJB520029, 16KJB520038) and the Science Foundation of Nantong of Jiangsu Grants (BK2014064). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiang Gu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gu, X., Wang, J., Qiu, J. et al. Self-Recommendation Mechanism in Trust Calculation Among Nodes in WSN. Wireless Pers Commun 97, 3705–3723 (2017). https://doi.org/10.1007/s11277-017-4694-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4694-1

Keywords

Navigation