Management and applications of trust in Wireless Sensor Networks: A survey

被引:229
作者
Han, Guangjie [1 ,2 ]
Jiang, Jinfang [1 ,2 ]
Shu, Lei [3 ]
Niu, Jianwei [4 ]
Chao, Han-Chieh [5 ,6 ]
机构
[1] Hohai Univ, Dept Informat & Commun Syst, Changzhou, Peoples R China
[2] Changzhou Key Lab Sensor Networks & Environm Sens, Changzhou, Peoples R China
[3] Guangdong Univ Petrochem Technol, Coll Elect Informat & Comp, Guangzhou, Guangdong, Peoples R China
[4] Beihang Univ, Sch Comp Sci & Engn, Beijing, Peoples R China
[5] Natl Ilan Univ, Dept Elect Engn, I Lam, Taiwan
[6] Natl Dong Hwa Univ, Dept Elect Engn, Hualien, Taiwan
关键词
Wireless Sensor Networks; Trust models; Cluster-based WSNs; SECURITY; REPUTATION;
D O I
10.1016/j.jcss.2013.06.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs. Crown Copyright (C) 2013 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:602 / 617
页数:16
相关论文
共 54 条
[1]
[Anonymous], P INT C WIR COMM NET
[2]
[Anonymous], 2004, INPROCEEDINGS ACM
[3]
[Anonymous], P 23 ANN JOINT C IEE
[4]
[Anonymous], INT J MULTIMEDIA UBI
[5]
Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836
[6]
Bekara C, 2007, LECT NOTES COMPUT SC, V4864, P784
[7]
Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[8]
Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105
[9]
Agent-based trust model in Wireless Sensor Networks [J].
Chen, Haiguang ;
Wu, Huafeng ;
Zhou, Xi ;
Gao, Chuanshan .
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, :119-+
[10]
Chen HG, 2009, INT J SECUR APPL, V3, P21