Comparative study of trust and reputation systems for wireless sensor networks

被引:65
作者
Khalid, Osman [1 ]
Khan, Samee U. [1 ]
Madani, Sajjad A. [2 ]
Hayat, Khizar [2 ]
Khan, Majid I. [2 ]
Min-Allah, Nasro [2 ]
Kolodziej, Joanna [3 ]
Wang, Lizhe [4 ]
Zeadally, Sherali [5 ]
Chen, Dan [6 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] COMSATS Inst Informat Technol, Islamabad, Pakistan
[3] Cracow Univ Technol, Krakow, Poland
[4] Chinese Acad Sci, Ctr Earth Observat & Digital Earth, Beijing, Peoples R China
[5] Univ Dist Columbia, Washington, DC USA
[6] China Univ Geosci, Wuhan 430074, Peoples R China
关键词
trust; repute; WSN; trust and reputation systems; AD HOC; MANAGEMENT; MOBILE; SECURITY; PRIVACY; SCHEMES; MODEL;
D O I
10.1002/sec.597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, because of unattended and insecure deployment, a sensor node may be physically captured by an adversary who may acquire the underlying secret keys, or a subset thereof, to access the critical data and/or other nodes present in the network. Moreover, a node may not properly operate because of insufficient resources or problems in the network link. In recent years, the basic ideas of trust and reputation have been applied to WSNs to monitor the changing behaviors of nodes in a network. Several trust and reputation monitoring (TRM) systems have been proposed, to integrate the concepts of trust in networks as an additional security measure, and various surveys are conducted on the aforementioned system. However, the existing surveys lack a comprehensive discussion on trust application specific to the WSNs. This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs. The survey discusses the components required to build a TRM and the trust computation phases explained with a study of various security attacks. The study investigates the recent advances in TRMs and includes a concise comparison of various TRMs. Finally, a discussion on open issues and challenges in the implementation of trust-based systems is also presented. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:669 / 688
页数:20
相关论文
共 93 条
[1]  
Aberer Karl, 2001, P 10 INT C INF KNOWL
[2]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[3]   Developing a model for trust management in pervasive devices [J].
Almenárez, F ;
Marín, A ;
Díaz, D ;
Sanchéz, J .
FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, :267-+
[4]  
[Anonymous], 2004, INPROCEEDINGS ACM
[5]  
[Anonymous], J AD HOC NETWORKING
[6]  
[Anonymous], KEYNOTE TRUST MANAGE
[7]  
[Anonymous], 28 INT C DISTR COMP
[8]  
[Anonymous], 2000, P 6 ANN INT C MOB CO
[9]  
[Anonymous], 2000, MOBICOM P
[10]  
[Anonymous], 2010, INT J AD HOC SENSOR, DOI DOI 10.5121/ijasuc.2010.1301