Abstract
Wireless sensor networks (WSNs) are composed of a large number of tiny sensor nodes that are self-organized through wireless communication. It aims to perceive, collect, and process information from network coverage areas. The open nature of WSNs makes them easily exposed to a variety of attacks and brings many security challenges. Furthermore, because of the limited resources, some nodes may refuse to forward packets by dropping them to save their resources such as battery, cache, and bandwidth. To resist the attacks from these selfish nodes and to punish them, we propose a fuzzy-based dynamic trust model in this paper. The model uses fuzzy sets combining with grey theory to evaluate every node’s trust credibility based on direct trust and indirect trust relationship. Only those with higher trust values can be chosen to forward packets. Those untrustworthy nodes with lower trust values will be detected and excluded from the trust list. Thus, our proposal also produces an incentive to compel the selfish nodes to wellbehave again to participate in the WSN again. Additionally, we introduce the time slice scheme to guarantee a reliable node possess enough time to enjoy its services, which can solve the problem that a suddenly interrupted link causes a significant decrease of the trust value. Simulation results show that our dynamic trust model can not only demonstrate the effectiveness in detecting selfish nodes, but also possess better performance even if the bursty traffic exists.
Similar content being viewed by others
References
Alcaraza C, Lopeza J, Romanb R, Chenc H-H (2012) Selecting key management schemes for wsn applications. Comput Secur 31(8):956–966
Avinash S, Joshua T, Jie W (2006) Drbts: distributed reputation-based beacon trust system. In: Proceeding of the second IEEE international symposium on dependable, autonomic and secure computing. IEEE Press, New York, pp 277–283
Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (January 1999) The role of trust management in distributed systems security. Secure Internet Program 1603(1):185–210
Carullo G, Castiglione A, Cattaneo G, De Santis A, Fiore U, Palmieri F (2013) Feeltrust: providing trustworthy communications in ubiquitous mobile environment. In: Proceeding of the 27th IEEE international conference on advanced information networking and applications, AINA 2013, Barcelona, Spain, March 25–28, 2013, pp 1113–1120
Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inform Syst 8(4):1207–1228
Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceeding of the 2010 IEEE Globecom workshops (GC Wkshps). IEEE Press, New York, pp 153–157
Fu C, Tang F, Cui Y, Liu M, Peng B (2009) Grey theory based nodes risk assessment in p2p networks. In: Proceeding of the IEEE international symposium on parallel and distributed processing with applications. IEEE Press, New York, pp 479–483
Ganeriwal S, Balzano LK, Srivastava MB (May 2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(15):1–12
Garth VC, Niki P (2007) Cluster-based reputation and trust for wireless sensor networks. In: Proceeding of the consumer communications and networking conference
Garth VC, Niki P, James G (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceeding of the second IEEE workshop on dependability and security in sensor networks and systems, 2006. DSSNS 2006. IEEE Press, New York
Haiguang C, Huafeng W, Xi Z, Chuanshan G (2007) Reputation-based trust in wireless sensor networks. In: Proceeding of the international conference on multimedia and ubiquitous engineering, 2007. MUE’07. IEEE Press, New York, pp 603–607
Hsieh M-Y, Huang Y-M, Chao H-C (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11):2385–2400
Hua-An L, Chen S-Y (2012) An application of grey theory to global trade predictions based on airport cargo traffic. J Grey Syst 15(4):195–204
Jin-Hee C, Swami A, Ing-Ray C (2004) A survey on trust management for mobile ad hoc networks. Commun Surv Tutor IEEE 13(4):562–583
Junbeom H, Younho L, Hyunsoo Y, Daeseon C, Seunghun J (2005) Trust evaluation model for wireless sensor networks. In: Proceeding of the seventh international conference on advanced communication technology, ICACT 2005, vol 1. IEEE Press, New York, pp 491–496
Klir GJ, Yuan B (1995) Fuzzy sets and fuzzy logic. Prentice Hall, New Jersey
Li G-D, Yamaguchi D, Nagai M (2007) A grey-based decision-making approach to the supplier selection problem. Math Comput Model 46(3):573–581
Li N, Das SK (2011) A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw
Liu B, Wu G, Yao K, Wang J (2011) A biometric key establishment protocol for body area networks. Distrib Sens Netw 2011(1):1–10
Liu S, Forrest J, Yang Y (2012) A brief introduction to grey systems theory. Grey Syst Theory Appl 2(2):89–104
Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407
Maarouf I, Baroudi U, Naseer AR (2009) Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Commun 3(5):846–858
Mohammad M (2008) Bayesian methods for modelling and management of trust in wireless sensor networks. PhD thesis, University of technology, Sydney
Mohammad M, Johnson A, Gina PN, Mahmood A et al (2006) A new algorithm of trust formation in wireless sensor networks. In: Proceeding of the the first IEEE international conference on wireless broadband and ultra wideband communications (AusWireless’ 06)
Mohammad M, Khalid A, Subhash C (2007) Rbatmwsn: recursive bayesian approach to trust management in wireless sensor networks. In: Proceeding of the the third international conference on intelligent sensors, sensor networks and information
Mohammad M, Subhash C, Rami A (2008) Bnwsn: bayesian network trust model for wireless sensor networks. In: MIC-CCA 2008. IEEE mosharaka international conference on communications, computers and applications. IEEE Press, New York, pp 110–115
Momani M, Johnson A, Navarrete G, Mahmood A et al (2005) Trust classification in wireless sensor networks
Nathan L, Noria F (2008) An efficient reputation-based routing mechanism for wireless sensor networks: testing the impact of mobility and hostile nodes. In: Proceeding of the sixth annual conference on privacy, security and trust, 2008. PST’08. IEEE Press, New York, pp 151–155
Nicola M, Licia C, Fabio P, Wolfgang E (2005) Tapas dynamic trust management. In: Technical Report IST-2001-34069, the European community under the information society technology programme
Pandurang K, Zhang Y, Trappe W (2005) Enhancing source-location privacy in sensor network routing. In: Proceeding of the 25th IEEE international conference on distributed computing systems, Columbus, Ohio, USA. IEEE Press, New York, pp 5996–5608
Quteishat A, Lim CP, Saleh JM, Tweedale J, Jain LC (2011) A neural network-based multi-agent classifier system with a bayesian formalism for trust measurement. Soft Comput 15(2):221–231
Rahhal HA, Ali IA, Shaheen SI (2011) A novel trust-based cross-layer model for wireless sensor networks. In: Proceeding of the 2011 28th national radio science conference (NRSC). IEEE Press, New York, pp 1–10
Shao F, Deng W, Yi F-j, Liu X-b (2009) Comprehensive evaluation method of metropolitan public transportation system based on analysis hierarchical process and grey theory. J PLA Univ Sci Technol (Nat Sci Ed) 6:536–541
Tajeddine A, Kayssi A, Chehab A, Artail H (2011) Fuzzy reputation-based trust model. Appl Soft Comput 11(1):345–355
Upendra S, Han HS, Lili Q, Yin Z (2008) Incentive-aware routing in dtns. In: ICNP 2008. IEEE international conference on network protocols. IEEE Press, New York, pp 238–247
Vahdat A, Becker D et al (2000) Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006. Duke University, USA
Vidhyapriya R, Vanathi PT (2007) Energy aware routing for wireless sensor networks. In: Proceeding of the international conference on signal processing, communications and networking. IEEE Press, New York, pp 545–550
Xing S, Zhang M, Bai Q (2012) A robust trust model for service oriented systems. J Comput Syst Sci 79:596–608
Acknowledgments
This research is sponsored in part by the National Natural Science Foundation of China (contract/ grant number: No.61173179, 61103146, 61202441), Program for New Century Excellent Talents in University (NCET-13-0083), and the Fundamental Research Funds for the Central Universities (No. DUT13JS10 and No. DUT14YQ212). This work was also supported in part by the Soonchunhyang University Research Fund.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by A. Castiglione.
Rights and permissions
About this article
Cite this article
Wu, G., Du, Z., Hu, Y. et al. A dynamic trust model exploiting the time slice in WSNs. Soft Comput 18, 1829–1840 (2014). https://doi.org/10.1007/s00500-014-1377-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-014-1377-7