Abstract
The state of the art trust management techniques especially designed for wireless sensor network, are not well suited due to less battery power and less memory of sensor nodes. In this work, we propose a fuzzy based hierarchical trust management scheme which includes direct trust calculation on real time past experience and credit based calculation and indirect trust calculation on peer recommendation. In this scheme cluster head and base station maintains constructive knowledge table based on fuzzy logic which reduces memory and communication overhead. As a whole the scheme reduces the communication overhead, computational time and memory utilization because it deals with decision rather than data compare to other existing schemes.
Similar content being viewed by others
References
Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379.
Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662–667.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Singh, M., & Das, R. (2012). Survey of different techniques to detect wormhole attack in wireless sensor network. International Journal of Scientific and Engineering Research (IJSER), 3(10), 1–6. ISSN 2229-5518.
Sahoo, R. R., Ray, S., Sarkar, S., & Bhoi, S. K. (2018). Guard against trust management vulnerabilities in wireless sensor network. Arabian Journal for Science and Engineering, 43(12), 7229–7251.
Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(8), 5137–5170.
Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.
Shaikh, R. A., Jameel, H., & d’Auriol, B. J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
Ganeriwal, S., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop on security (Vol. 4(3), No. 15).
Chen, H., Wu, H., Hu, J., & Gao, C. (2008). Agent-based trust management model for wireless sensor networks. In International conference on multimedia and ubiquitous engineering (pp. 150–154).
Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the 3rd IEEE international conference on mobile ad hoc and sensor systems (MASS’06) (pp. 437–446).
Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless. International Journal of Intelligent Control and Systems, 13(2), 146–151.
Narayanan, U., & Soman, A. (2013). CAFS: Cluster based authentication scheme for filtering false data in wireless sensor network. International Journal of Advanced Research in Computer and Communication Engineering, 2(8), 3037–3041.
Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. In 11th international workshop on knowledge management and acquisition for smart systems and services (PKAW 2010) (Vol. 11(5), p. 4767).
Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Elsevier, Security Issues in Sensor and Ad Hoc Networks, 5(1), 35–48.
Chen, H., Wu, H., Hu, J., & Gao, C. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage (pp. 359–364).
Zacharia, G., Moukas, A., & Mae, P. (2000). Collaborative reputation mechanisms for electronic marketplaces. Decision Support Systems, 29(4), 1–7.
Liu, K., Abu-Ghazaleh, N., & Kang, K.-D. (2007). Location verification and trust management for resilient geographic routing. Journal of Parallel and Distributed Computing, 67(2), 215–228.
Liang, Z., & Shi, W. (2010). TRECON: A trust-based economic framework for efficient internet routing. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, 40(1), 52–67.
Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–3289.
Carbo, J., Molina, J. M., & Davila, J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems, 12(1), 135–155.
Carbo, J., Molina, J. M., & Davila, J. (2002). Comparing predictions of SPORAS vs. a fuzzy reputation system. In 3rd international conference on fuzzy sets and fuzzy systems.
Labraoui, N. (2015). A reliable trust management scheme in wireless sensor networks. In 12th international symposium on programming and systems (ISPS 2015) (pp. 1–6). Algiers.
Luo, W., Ma, W., & Gao, Q. (2016). A dynamic trust management system for wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9(7), 613–621.
Monia, Randhawa, S., & Jain, S. (2016). An efficient trust management algorithm in wireless sensor network. In N. R. Shetty, N. Hamsavath Prasad, & N. Nalini (Eds.), Emerging research in computing, information, communication and applications (Vol. 3, pp. 281–287). Singapore: Springer.
Guo, J., Ma, J., & Wan, T. (2017). A mutual evaluation based trust management method for wireless sensor networks. Chinese Journal of Electronics, 26(2), 407–415.
Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, PP(99), 1.
Priayoheswari, B., Kulothungan, K., & Kannan, A. (2016). Beta reputation and direct trust model for secure communication in wireless sensor networks. In Proceeding ICIA-16 proceedings of the international conference on informatics and analytics (Vol. 73).
Babu, S., Raha, A., & Naskar, M. (2014). Trust evaluation based on node’s characteristics and neighbouring nodes’ recommendations for WSN. Wireless Sensor Network, 6(8), 157–172.
Singh, M., & Das, R. (2015). KT3F: A key based two tier trust management filtering scheme for intrusion detection in wireless sensor network. In Proceedings of the 2nd international conference on computer and communication technologies (Springer series) (Vol. 379, pp. 679–690).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Das, R., Dash, D. & Sarkar, M.K. HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN. Wireless Pers Commun 112, 1079–1112 (2020). https://doi.org/10.1007/s11277-020-07092-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07092-w