Skip to main content
Log in

A dynamic trust model exploiting the time slice in WSNs

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are composed of a large number of tiny sensor nodes that are self-organized through wireless communication. It aims to perceive, collect, and process information from network coverage areas. The open nature of WSNs makes them easily exposed to a variety of attacks and brings many security challenges. Furthermore, because of the limited resources, some nodes may refuse to forward packets by dropping them to save their resources such as battery, cache, and bandwidth. To resist the attacks from these selfish nodes and to punish them, we propose a fuzzy-based dynamic trust model in this paper. The model uses fuzzy sets combining with grey theory to evaluate every node’s trust credibility based on direct trust and indirect trust relationship. Only those with higher trust values can be chosen to forward packets. Those untrustworthy nodes with lower trust values will be detected and excluded from the trust list. Thus, our proposal also produces an incentive to compel the selfish nodes to wellbehave again to participate in the WSN again. Additionally, we introduce the time slice scheme to guarantee a reliable node possess enough time to enjoy its services, which can solve the problem that a suddenly interrupted link causes a significant decrease of the trust value. Simulation results show that our dynamic trust model can not only demonstrate the effectiveness in detecting selfish nodes, but also possess better performance even if the bursty traffic exists.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  • Alcaraza C, Lopeza J, Romanb R, Chenc H-H (2012) Selecting key management schemes for wsn applications. Comput Secur 31(8):956–966

    Article  Google Scholar 

  • Avinash S, Joshua T, Jie W (2006) Drbts: distributed reputation-based beacon trust system. In: Proceeding of the second IEEE international symposium on dependable, autonomic and secure computing. IEEE Press, New York, pp 277–283

  • Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (January 1999) The role of trust management in distributed systems security. Secure Internet Program 1603(1):185–210

  • Carullo G, Castiglione A, Cattaneo G, De Santis A, Fiore U, Palmieri F (2013) Feeltrust: providing trustworthy communications in ubiquitous mobile environment. In: Proceeding of the 27th IEEE international conference on advanced information networking and applications, AINA 2013, Barcelona, Spain, March 25–28, 2013, pp 1113–1120

  • Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inform Syst 8(4):1207–1228

  • Deng H, Yang Y, Jin G, Xu R, Shi W (2010) Building a trust-aware dynamic routing solution for wireless sensor networks. In: Proceeding of the 2010 IEEE Globecom workshops (GC Wkshps). IEEE Press, New York, pp 153–157

  • Fu C, Tang F, Cui Y, Liu M, Peng B (2009) Grey theory based nodes risk assessment in p2p networks. In: Proceeding of the IEEE international symposium on parallel and distributed processing with applications. IEEE Press, New York, pp 479–483

  • Ganeriwal S, Balzano LK, Srivastava MB (May 2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN) 4(15):1–12

  • Garth VC, Niki P (2007) Cluster-based reputation and trust for wireless sensor networks. In: Proceeding of the consumer communications and networking conference

  • Garth VC, Niki P, James G (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceeding of the second IEEE workshop on dependability and security in sensor networks and systems, 2006. DSSNS 2006. IEEE Press, New York

  • Haiguang C, Huafeng W, Xi Z, Chuanshan G (2007) Reputation-based trust in wireless sensor networks. In: Proceeding of the international conference on multimedia and ubiquitous engineering, 2007. MUE’07. IEEE Press, New York, pp 603–607

  • Hsieh M-Y, Huang Y-M, Chao H-C (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11):2385–2400

    Article  Google Scholar 

  • Hua-An L, Chen S-Y (2012) An application of grey theory to global trade predictions based on airport cargo traffic. J Grey Syst 15(4):195–204

    Google Scholar 

  • Jin-Hee C, Swami A, Ing-Ray C (2004) A survey on trust management for mobile ad hoc networks. Commun Surv Tutor IEEE 13(4):562–583

    Google Scholar 

  • Junbeom H, Younho L, Hyunsoo Y, Daeseon C, Seunghun J (2005) Trust evaluation model for wireless sensor networks. In: Proceeding of the seventh international conference on advanced communication technology, ICACT 2005, vol 1. IEEE Press, New York, pp 491–496

  • Klir GJ, Yuan B (1995) Fuzzy sets and fuzzy logic. Prentice Hall, New Jersey

  • Li G-D, Yamaguchi D, Nagai M (2007) A grey-based decision-making approach to the supplier selection problem. Math Comput Model 46(3):573–581

    Article  Google Scholar 

  • Li N, Das SK (2011) A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw

  • Liu B, Wu G, Yao K, Wang J (2011) A biometric key establishment protocol for body area networks. Distrib Sens Netw 2011(1):1–10

    Google Scholar 

  • Liu S, Forrest J, Yang Y (2012) A brief introduction to grey systems theory. Grey Syst Theory Appl 2(2):89–104

    Google Scholar 

  • Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407

    Article  MATH  Google Scholar 

  • Maarouf I, Baroudi U, Naseer AR (2009) Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Commun 3(5):846–858

    Article  Google Scholar 

  • Mohammad M (2008) Bayesian methods for modelling and management of trust in wireless sensor networks. PhD thesis, University of technology, Sydney

  • Mohammad M, Johnson A, Gina PN, Mahmood A et al (2006) A new algorithm of trust formation in wireless sensor networks. In: Proceeding of the the first IEEE international conference on wireless broadband and ultra wideband communications (AusWireless’ 06)

  • Mohammad M, Khalid A, Subhash C (2007) Rbatmwsn: recursive bayesian approach to trust management in wireless sensor networks. In: Proceeding of the the third international conference on intelligent sensors, sensor networks and information

  • Mohammad M, Subhash C, Rami A (2008) Bnwsn: bayesian network trust model for wireless sensor networks. In: MIC-CCA 2008. IEEE mosharaka international conference on communications, computers and applications. IEEE Press, New York, pp 110–115

  • Momani M, Johnson A, Navarrete G, Mahmood A et al (2005) Trust classification in wireless sensor networks

  • Nathan L, Noria F (2008) An efficient reputation-based routing mechanism for wireless sensor networks: testing the impact of mobility and hostile nodes. In: Proceeding of the sixth annual conference on privacy, security and trust, 2008. PST’08. IEEE Press, New York, pp 151–155

  • Nicola M, Licia C, Fabio P, Wolfgang E (2005) Tapas dynamic trust management. In: Technical Report IST-2001-34069, the European community under the information society technology programme

  • Pandurang K, Zhang Y, Trappe W (2005) Enhancing source-location privacy in sensor network routing. In: Proceeding of the 25th IEEE international conference on distributed computing systems, Columbus, Ohio, USA. IEEE Press, New York, pp 5996–5608

  • Quteishat A, Lim CP, Saleh JM, Tweedale J, Jain LC (2011) A neural network-based multi-agent classifier system with a bayesian formalism for trust measurement. Soft Comput 15(2):221–231

    Article  Google Scholar 

  • Rahhal HA, Ali IA, Shaheen SI (2011) A novel trust-based cross-layer model for wireless sensor networks. In: Proceeding of the 2011 28th national radio science conference (NRSC). IEEE Press, New York, pp 1–10

  • Shao F, Deng W, Yi F-j, Liu X-b (2009) Comprehensive evaluation method of metropolitan public transportation system based on analysis hierarchical process and grey theory. J PLA Univ Sci Technol (Nat Sci Ed) 6:536–541

    Google Scholar 

  • Tajeddine A, Kayssi A, Chehab A, Artail H (2011) Fuzzy reputation-based trust model. Appl Soft Comput 11(1):345–355

    Article  Google Scholar 

  • Upendra S, Han HS, Lili Q, Yin Z (2008) Incentive-aware routing in dtns. In: ICNP 2008. IEEE international conference on network protocols. IEEE Press, New York, pp 238–247

  • Vahdat A, Becker D et al (2000) Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006. Duke University, USA

  • Vidhyapriya R, Vanathi PT (2007) Energy aware routing for wireless sensor networks. In: Proceeding of the international conference on signal processing, communications and networking. IEEE Press, New York, pp 545–550

  • Xing S, Zhang M, Bai Q (2012) A robust trust model for service oriented systems. J Comput Syst Sci 79:596–608

    Google Scholar 

Download references

Acknowledgments

This research is sponsored in part by the National Natural Science Foundation of China (contract/ grant number: No.61173179, 61103146, 61202441), Program for New Century Excellent Talents in University (NCET-13-0083), and the Fundamental Research Funds for the Central Universities (No. DUT13JS10 and No. DUT14YQ212). This work was also supported in part by the Soonchunhyang University Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim.

Additional information

Communicated by A. Castiglione.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, G., Du, Z., Hu, Y. et al. A dynamic trust model exploiting the time slice in WSNs. Soft Comput 18, 1829–1840 (2014). https://doi.org/10.1007/s00500-014-1377-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-014-1377-7

Keywords

Navigation