Skip to main content
Log in

WSANRep, WSAN Reputation-Based Selection in Open Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless Sensor and Actuator Networks (WSAN) are becoming more and more relevant and are likely to spread everywhere, due to their numerous applications and benefits. In fact, they are a key element in the vision of the so called Internet of Things. Nevertheless, the lack of central control and the existence of incentives for cheating lead to the necessity of defining mechanisms for identifying well-behaving WSANs. Reputation based solutions have been suggested in the literature in order to cope with these situations, but most of them were focused on finding a specific most trustworthy sensor, capable of provisioning a requested service. Our work, however, is oriented to provide a mobile user with an accurate reputation-based mechanism allowing her to select, amongst a set of available WSANs, the most reputable one, according to the recommendations given by other users. Thus, the mobile user can build her own opinion and consequently decide which is the best WSAN to interact with. This decision will be based in her own criteria, which might be different from other users of the same service. In order to prevent the abuse of the proposed reputation system, we suggest a mechanism avoiding multiple recommendations from the same user in a specific time frame. Additionally, we handle certain privacy issues by hiding the real identity of a user behind a group. The experiments performed show the accuracy, scalability and robustness of our proposal, called WSANRep, within several scenarios, considering the existence of malicious recommenders and malicious service providers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communications Magazine 40(8): 102–114. doi:10.1109/MCOM.2002.1024422

    Article  Google Scholar 

  2. Bohli J. M., Sorge C., Westhoff D. (2009) Initial observations on economics, pricing, and penetration of the internet of things market. ACM SIGCOMM Computer Communication Review 39(2): 50–55. doi:10.1145/1517480.1517491

    Article  Google Scholar 

  3. Boukerche A., Xu L., El-Khatib K. (2007) Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11–12): 2413–2427

    Article  Google Scholar 

  4. Commission of the European Communities. (2009). Internet of things—an action plan for Europe. Technical report, European Union, Brussels, Belgium. URL http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf .

  5. Conner, M. (2010). Sensors empower the “internet of things” (pp. 32–38). ISSN 0012-7515.

  6. Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In International workshop on security, privacy and trust in pervasive and ubiquitous computing (pp. 25–30).

  7. Furukawa J., Imai H. (2006) An efficient group signature scheme from bilinear maps. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E 89-A(5): 1328–1338. doi:10.1093/ietfec/e89-a.5.1328

    Article  Google Scholar 

  8. Gómez Mármol F., Martínez Pérez G. (2009) Security threats scenarios in trust and reputation models for distributed systems. Elsevier Computers & Security 28(7): 545–556

    Google Scholar 

  9. Gómez Mármol F., Martínez Pérez G. (2010) Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces 32(4): 185–196

    Article  Google Scholar 

  10. Guinard D., Trifa V., Karnouskos S., Spiess P., Savio D. (2010) Interacting with the soa-based internet of things: Discovery, query, selection, and on-demand provisioning of web services. IEEE Transactions on Services Computing 3(3): 223–235

    Article  Google Scholar 

  11. Josang A., Ismail R., Boyd C. (2007) A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2): 618–644

    Article  Google Scholar 

  12. Kamvar, S., Schlosser, M., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the international World Wide Web conference (WWW). Budapest, Hungary.

  13. Lam, S. K., & Riedl, J. (2004). Shilling recommender systems for fun and profit. In WWW ’04: Proceedings of the 13th international conference on World Wide Web (pp. 393–402). New York, NY, USA.

  14. Lopez J., Roman R., Agudo I., Fernandez-Gago C. (2010) Trust management systems for wireless sensor networks: Best practices. Computer Communications 33(9): 1086–1093

    Article  Google Scholar 

  15. Marti S., Garcia-Molina H. (2006) Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4): 472–484

    Article  MATH  Google Scholar 

  16. Momani M. (2010) Trust Models in wireless sensor networks: A survey. In: Natarajan M., Selma B., Nabendu C., Dhinaharan N. (eds) Recent trends in network security and applications, third international conference, CNSA 2010, communications in computer and information science Vol 89. Chennai, India, pp 37–46

    Google Scholar 

  17. Parikshit, M., Sachin, B., Neeli, P., & Ramjee, P. (2010). Identity management framework towards internet of things (IoT): Roadmap and key challenges. In M. Natarajan, B. Selma, C. Nabendu, N. Dhinaharan (Eds.), Recent trends in network security and applications, third international conference, CNSA 2010, communications in computer and information science (Vol. 89, pp. 430–439). Chennai, India.

    Google Scholar 

  18. Presser M., Barnaghi P. M., Eurich M., Villalonga C. (2009) The sensei project: Integrating the physical world with the digital world of the network of the future. IEEE Communications Magazine 47(4): 1–4. doi:10.1109/MCOM.2009.4907403

    Article  Google Scholar 

  19. Resnick P., Kuwabara K., Zeckhauser R., Friedman E. (2000) Reputation systems. Communications of the ACM 43(12): 45–48. doi:10.1145/355112.355122

    Article  Google Scholar 

  20. Roman, R., Fernandez-Gago, M. C., & Lopez, J. (2007). Featuring trust and reputation management systems for constrained hardware devices. In Autonomics ’07: Proceedings of the 1st international conference on Autonomic computing and communication systems (pp. 1–6). Rome, Italy.

  21. Römer K., Mattern F. (2004) The design space of wireless sensor networks. IEEE Wireless Communications 11(6): 54–61

    Article  Google Scholar 

  22. Sachin B., Parikshit M., Antonietta S., Neeli P., Ramjee P. (2010) Proposed security model and threat taxonomy for the internet of things (IoT). In: Natarajan M., Selma B., Nabendu C., Dhinaharan N. (eds) Recent trends in network security and applications, third international conference, CNSA 2010, communications in computer and information science Vol 89. Chennai, India, pp 420–429

    Google Scholar 

  23. Sirin, E., Parsia, B., & Hendler, J. (2004). Composition-driven filtering and selection of semantic web services. In AAAI spring symposium on semantic web services (pp. 129–138).

  24. Sun, Y., & Yang, Y. (2007). Trust establishment in distributed networks: Analysis and modeling. In Proceedings of the IEEE international conference on communications. Glasgow, Scotland.

  25. Vu L. H., Hauswirth M., Aberer K. (2005) Qos-based service selection and ranking with trust and reputation management. In: Meersman R., Tari Z. (eds) On the move to meaningful internet systems 2005: CoopIS, DOA, and ODBASE, lecture notes in computer science (Vol. 3760, pp. 466–483). Springer, Berlin, Heidelberg

    Chapter  Google Scholar 

  26. Xiong L., Liu L. (2004) PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 16(7): 843–857

    Article  Google Scholar 

  27. Yicka J., Mukherjeea B., Ghosal D. (2008) A survey on sensor networks. Computer Networks 52(12): 2292–2330

    Article  Google Scholar 

  28. Zhou R., Hwang K. (2007) PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. Transactions on Parallel and Distributed Systems 18(4): 460–473

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Félix Gómez Mármol.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mármol, F.G., Sorge, C., Ugus, O. et al. WSANRep, WSAN Reputation-Based Selection in Open Environments. Wireless Pers Commun 68, 921–937 (2013). https://doi.org/10.1007/s11277-011-0490-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-011-0490-5

Keywords

Navigation