Abstract
This paper proposes a node self-recommendation mechanism which is effective in trust calculation model in wireless sensor networks (WSNs). The mechanism has little practical sense to cable and wireless network among which nodes’ resources, especially energy, are almost unlimited; furthermore it may bring some security risk to networks on the contrary. But as to WSNs where nodes’ resources are strictly limited, a node can express its intension of participating communication to its neighbors by using the mechanism according to its current running state and predefined strategies. This mechanism is useful to save nodes’ energy, balance network load and prolong network lifetime ultimately. The paper focuses on self-recommendation value expression, calculation and synthesis method. Application method of the mechanism is also discussed. Simulation results show that using trust calculation model cooperatively with self-recommendation mechanism can protect low energy nodes effectively and balance energy consumption among adjacent nodes without weakening malicious node identification function of the trust model.
Similar content being viewed by others
References
Freudenthal, E., Pesin, T., Port, L., Keenan, K., & Karamcheti, V. (2002). dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the. 22nd international conference on distributed computing systems (pp. 411–420). IEEE.
Ryutov, T., & Neuman, C. (2007). Trust based approach for improving data reliability in industrial sensor networks. Trust Management (pp. 349–365). Berlin: Springer.
Lu, Y., Lin, K., & Li, K. (2012) Trust evaluation model against insider attack in wireless sensor networks. In International conference on cloud and green computing (pp. 319–326). IEEE.
Ruohomaa, S., & Kutvonen, L. (2005). Trust management survey. Trust management (pp. 77–92). Berlin: Springer.
Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.
Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30(11), 2411–2427.
Ganeriwal, S., Srivastava. M. B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 66–77).
Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., & Caredei, M. (2008). Reputation and trust based system for ad hoc and sensor networks. In A. Boukerche (Ed.), Algorithms and protocols for wireless ad-hoc and sensor netowrks. New Jersey: Wiley.
Chen, H., Wu, H., Zhou, X., & Gao, C. (2007). Agent-based trust model in wireless sensor networks. In 8th ACIS international conference software engineering, artificial intelligence parallel/distribute computing (pp. 119–124).
Liu, S., Pang, L., Pei, Q., Ma, H., & Peng, Q. (2009) Distributed event-triggered trust management for wirless sensor networks. In 5th international conference on information assurance and security.
Qiming, H., & Haiyan, N. (2009). Reputation computing for wireless sensor networks based on dirichlet distribution. Chinese Journal of Sensors and Actuators, 22(4), 526–529.
Wen, T., & Zhong, C. (2003). Research of subjective trust management model based on the fuzzy set theory. Journal of Software, 14(8), 1401–1407.
Tang Wen, H., & Jianbin, C. Z. (2005). Research on a fuzzy logic-based subjective trust management model. Journal of Computer Research and Development, 42(10), 1654–1659.
Cheng, J., Wang, H., Bao, C., & Bao, H. (2012). Trust evaluation model based on fuzzy logic in wireless sensor networks. Measurement and Control Technology, 31(4), 13–16.
Jian, C., Feng Renjian, X., & Xianfeng, W. J. (2009). Trust evaluation model based on d-s evidence theory in wireless sensor network. Chinese Journal of Sensors and Actuators, 22(12), 1802–1807.
Michiardi, P., & Molva, R. (2002) CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, 9.
Yau, P. W., & Mitchell, C. J. (2003) Reputation methods for routing security for mobile ad hoc networks. In Proceedings of joint IST workshop on mobile fitire and symposiim on trends in communications (pp. 130–137).
Bin, Ma., & Xianzhong, X. (2010). Cloud trust for wireless sensor networks. Computer Science, 37(3), 128–132.
Zhikui, C., & Bingjie, Z. (2010). Trust evaluation for wireless sensor networks based on trust-cloud. Journal of Computer Applications, 30(12), 3346–3348.
Vamsi, P. R., & Kant, K. (2014). Performance analysis of trust based geographic routing protocols for wireless sensor networks. In International conference on parallel, distributed and grid computing (PDGC) (pp. 318–323). IEEE.
Ramalingam, L., & Audithan, S. (2014). Trust based cluster head selection algorithm for wireless sensor network. In International conference on current trends in engineering and technology (ICCTET) (pp. 453–457). IEEE.
Alkalbani, A. S., Tap, A. M., & Mantoro, T. (2013). Energy consumption evaluation in trust and reputation models for wireless sensor networks. In International conference on information and communication technology for the Muslim World (ICT4 M) (pp. 1–6). IEEE.
Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., & Teo, J. C. M. (2015). Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Transactions on Information Forensics and Security, 10(3), 613–625.
Tianhua, W., & Na, W. (2014). A trust model for wireless sensor networks based on multi-factors. In International conference on computer science & education (ICCSE) (pp. 407–410). IEEE.
Xiang, G., Jianlin, Q., Zhan, G., & Jin, W. (2012). A kind of trust calculation model among nodes in wireless sensor networks. ICIC Express Letters, 6(7), 1821–1826.
Acknowledgements
This work is supported by Jiangsu Overseas Research & Training Program for University Prominent Young &Middle-aged Teachers and Presidents Project, and in part by the Natural Science Foundation of the Jiangsu Higher Education Institutions (15KJB520029, 16KJB520038) and the Science Foundation of Nantong of Jiangsu Grants (BK2014064). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gu, X., Wang, J., Qiu, J. et al. Self-Recommendation Mechanism in Trust Calculation Among Nodes in WSN. Wireless Pers Commun 97, 3705–3723 (2017). https://doi.org/10.1007/s11277-017-4694-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4694-1