Comparative study of trust and reputation systems for wireless sensor networks

被引:65
作者
Khalid, Osman [1 ]
Khan, Samee U. [1 ]
Madani, Sajjad A. [2 ]
Hayat, Khizar [2 ]
Khan, Majid I. [2 ]
Min-Allah, Nasro [2 ]
Kolodziej, Joanna [3 ]
Wang, Lizhe [4 ]
Zeadally, Sherali [5 ]
Chen, Dan [6 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] COMSATS Inst Informat Technol, Islamabad, Pakistan
[3] Cracow Univ Technol, Krakow, Poland
[4] Chinese Acad Sci, Ctr Earth Observat & Digital Earth, Beijing, Peoples R China
[5] Univ Dist Columbia, Washington, DC USA
[6] China Univ Geosci, Wuhan 430074, Peoples R China
关键词
trust; repute; WSN; trust and reputation systems; AD HOC; MANAGEMENT; MOBILE; SECURITY; PRIVACY; SCHEMES; MODEL;
D O I
10.1002/sec.597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, because of unattended and insecure deployment, a sensor node may be physically captured by an adversary who may acquire the underlying secret keys, or a subset thereof, to access the critical data and/or other nodes present in the network. Moreover, a node may not properly operate because of insufficient resources or problems in the network link. In recent years, the basic ideas of trust and reputation have been applied to WSNs to monitor the changing behaviors of nodes in a network. Several trust and reputation monitoring (TRM) systems have been proposed, to integrate the concepts of trust in networks as an additional security measure, and various surveys are conducted on the aforementioned system. However, the existing surveys lack a comprehensive discussion on trust application specific to the WSNs. This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs. The survey discusses the components required to build a TRM and the trust computation phases explained with a study of various security attacks. The study investigates the recent advances in TRMs and includes a concise comparison of various TRMs. Finally, a discussion on open issues and challenges in the implementation of trust-based systems is also presented. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:669 / 688
页数:20
相关论文
共 93 条
[11]  
[Anonymous], 2010, INT J NETW SECUR ITS, DOI DOI 10.5121/IJNSA.2010.2304
[12]  
[Anonymous], 33 HAW INT C SYST SC
[13]   Reputation management in collaborative computing systems [J].
Arenas, Alvaro E. ;
Aziz, Benjamin ;
Silaghi, Gheorghe Cosmin .
SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) :546-564
[14]   A guide to trust in mobile ad hoc networks [J].
Balfe, Shane ;
Yau, Po-Wah ;
Paterson, Kenneth G. .
SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) :503-516
[15]  
Bansal S, 2003, P COMP RES REP CORR
[16]   Clarifying the Integration of Trust and TAM in E-Commerce Environments: Implications for Systems Design and Management [J].
Benamati, John 'Skip' ;
Fuller, Mark A. ;
Serva, Mark A. ;
Baroudi, Jack .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2010, 57 (03) :380-393
[17]   Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria [J].
Bistarelli, S. ;
Foley, S. N. ;
O'Sullivan, B. ;
Santini, F. .
SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) :595-610
[18]   Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies [J].
Blanquer, I. ;
Hernandez, V. ;
Segrelles, D. ;
Torres, E. .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2009, 13 (01) :16-24
[19]   Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme [J].
Borowski, John F. ;
Hopkinson, Kenneth M. ;
Humphries, Jeffrey W. ;
Borghetti, Brett J. .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :287-301
[20]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427