Abstract
Wireless Sensor and Actuator Networks (WSAN) are becoming more and more relevant and are likely to spread everywhere, due to their numerous applications and benefits. In fact, they are a key element in the vision of the so called Internet of Things. Nevertheless, the lack of central control and the existence of incentives for cheating lead to the necessity of defining mechanisms for identifying well-behaving WSANs. Reputation based solutions have been suggested in the literature in order to cope with these situations, but most of them were focused on finding a specific most trustworthy sensor, capable of provisioning a requested service. Our work, however, is oriented to provide a mobile user with an accurate reputation-based mechanism allowing her to select, amongst a set of available WSANs, the most reputable one, according to the recommendations given by other users. Thus, the mobile user can build her own opinion and consequently decide which is the best WSAN to interact with. This decision will be based in her own criteria, which might be different from other users of the same service. In order to prevent the abuse of the proposed reputation system, we suggest a mechanism avoiding multiple recommendations from the same user in a specific time frame. Additionally, we handle certain privacy issues by hiding the real identity of a user behind a group. The experiments performed show the accuracy, scalability and robustness of our proposal, called WSANRep, within several scenarios, considering the existence of malicious recommenders and malicious service providers.
Similar content being viewed by others
References
Akyildiz I., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communications Magazine 40(8): 102–114. doi:10.1109/MCOM.2002.1024422
Bohli J. M., Sorge C., Westhoff D. (2009) Initial observations on economics, pricing, and penetration of the internet of things market. ACM SIGCOMM Computer Communication Review 39(2): 50–55. doi:10.1145/1517480.1517491
Boukerche A., Xu L., El-Khatib K. (2007) Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11–12): 2413–2427
Commission of the European Communities. (2009). Internet of things—an action plan for Europe. Technical report, European Union, Brussels, Belgium. URL http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf .
Conner, M. (2010). Sensors empower the “internet of things” (pp. 32–38). ISSN 0012-7515.
Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In International workshop on security, privacy and trust in pervasive and ubiquitous computing (pp. 25–30).
Furukawa J., Imai H. (2006) An efficient group signature scheme from bilinear maps. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E 89-A(5): 1328–1338. doi:10.1093/ietfec/e89-a.5.1328
Gómez Mármol F., Martínez Pérez G. (2009) Security threats scenarios in trust and reputation models for distributed systems. Elsevier Computers & Security 28(7): 545–556
Gómez Mármol F., Martínez Pérez G. (2010) Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces 32(4): 185–196
Guinard D., Trifa V., Karnouskos S., Spiess P., Savio D. (2010) Interacting with the soa-based internet of things: Discovery, query, selection, and on-demand provisioning of web services. IEEE Transactions on Services Computing 3(3): 223–235
Josang A., Ismail R., Boyd C. (2007) A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2): 618–644
Kamvar, S., Schlosser, M., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the international World Wide Web conference (WWW). Budapest, Hungary.
Lam, S. K., & Riedl, J. (2004). Shilling recommender systems for fun and profit. In WWW ’04: Proceedings of the 13th international conference on World Wide Web (pp. 393–402). New York, NY, USA.
Lopez J., Roman R., Agudo I., Fernandez-Gago C. (2010) Trust management systems for wireless sensor networks: Best practices. Computer Communications 33(9): 1086–1093
Marti S., Garcia-Molina H. (2006) Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4): 472–484
Momani M. (2010) Trust Models in wireless sensor networks: A survey. In: Natarajan M., Selma B., Nabendu C., Dhinaharan N. (eds) Recent trends in network security and applications, third international conference, CNSA 2010, communications in computer and information science Vol 89. Chennai, India, pp 37–46
Parikshit, M., Sachin, B., Neeli, P., & Ramjee, P. (2010). Identity management framework towards internet of things (IoT): Roadmap and key challenges. In M. Natarajan, B. Selma, C. Nabendu, N. Dhinaharan (Eds.), Recent trends in network security and applications, third international conference, CNSA 2010, communications in computer and information science (Vol. 89, pp. 430–439). Chennai, India.
Presser M., Barnaghi P. M., Eurich M., Villalonga C. (2009) The sensei project: Integrating the physical world with the digital world of the network of the future. IEEE Communications Magazine 47(4): 1–4. doi:10.1109/MCOM.2009.4907403
Resnick P., Kuwabara K., Zeckhauser R., Friedman E. (2000) Reputation systems. Communications of the ACM 43(12): 45–48. doi:10.1145/355112.355122
Roman, R., Fernandez-Gago, M. C., & Lopez, J. (2007). Featuring trust and reputation management systems for constrained hardware devices. In Autonomics ’07: Proceedings of the 1st international conference on Autonomic computing and communication systems (pp. 1–6). Rome, Italy.
Römer K., Mattern F. (2004) The design space of wireless sensor networks. IEEE Wireless Communications 11(6): 54–61
Sachin B., Parikshit M., Antonietta S., Neeli P., Ramjee P. (2010) Proposed security model and threat taxonomy for the internet of things (IoT). In: Natarajan M., Selma B., Nabendu C., Dhinaharan N. (eds) Recent trends in network security and applications, third international conference, CNSA 2010, communications in computer and information science Vol 89. Chennai, India, pp 420–429
Sirin, E., Parsia, B., & Hendler, J. (2004). Composition-driven filtering and selection of semantic web services. In AAAI spring symposium on semantic web services (pp. 129–138).
Sun, Y., & Yang, Y. (2007). Trust establishment in distributed networks: Analysis and modeling. In Proceedings of the IEEE international conference on communications. Glasgow, Scotland.
Vu L. H., Hauswirth M., Aberer K. (2005) Qos-based service selection and ranking with trust and reputation management. In: Meersman R., Tari Z. (eds) On the move to meaningful internet systems 2005: CoopIS, DOA, and ODBASE, lecture notes in computer science (Vol. 3760, pp. 466–483). Springer, Berlin, Heidelberg
Xiong L., Liu L. (2004) PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 16(7): 843–857
Yicka J., Mukherjeea B., Ghosal D. (2008) A survey on sensor networks. Computer Networks 52(12): 2292–2330
Zhou R., Hwang K. (2007) PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. Transactions on Parallel and Distributed Systems 18(4): 460–473
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mármol, F.G., Sorge, C., Ugus, O. et al. WSANRep, WSAN Reputation-Based Selection in Open Environments. Wireless Pers Commun 68, 921–937 (2013). https://doi.org/10.1007/s11277-011-0490-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-011-0490-5