Skip to main content
Log in

HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The state of the art trust management techniques especially designed for wireless sensor network, are not well suited due to less battery power and less memory of sensor nodes. In this work, we propose a fuzzy based hierarchical trust management scheme which includes direct trust calculation on real time past experience and credit based calculation and indirect trust calculation on peer recommendation. In this scheme cluster head and base station maintains constructive knowledge table based on fuzzy logic which reduces memory and communication overhead. As a whole the scheme reduces the communication overhead, computational time and memory utilization because it deals with decision rather than data compare to other existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379.

    Article  Google Scholar 

  2. Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662–667.

    Article  Google Scholar 

  3. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

  4. Singh, M., & Das, R. (2012). Survey of different techniques to detect wormhole attack in wireless sensor network. International Journal of Scientific and Engineering Research (IJSER), 3(10), 1–6. ISSN 2229-5518.

    Google Scholar 

  5. Sahoo, R. R., Ray, S., Sarkar, S., & Bhoi, S. K. (2018). Guard against trust management vulnerabilities in wireless sensor network. Arabian Journal for Science and Engineering, 43(12), 7229–7251.

    Article  Google Scholar 

  6. Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(8), 5137–5170.

    Article  Google Scholar 

  7. Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.

    Article  Google Scholar 

  8. Shaikh, R. A., Jameel, H., & d’Auriol, B. J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.

    Article  Google Scholar 

  9. Ganeriwal, S., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop on security (Vol. 4(3), No. 15).

  10. Chen, H., Wu, H., Hu, J., & Gao, C. (2008). Agent-based trust management model for wireless sensor networks. In International conference on multimedia and ubiquitous engineering (pp. 150–154).

  11. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the 3rd IEEE international conference on mobile ad hoc and sensor systems (MASS’06) (pp. 437–446).

  12. Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless. International Journal of Intelligent Control and Systems, 13(2), 146–151.

    Google Scholar 

  13. Narayanan, U., & Soman, A. (2013). CAFS: Cluster based authentication scheme for filtering false data in wireless sensor network. International Journal of Advanced Research in Computer and Communication Engineering, 2(8), 3037–3041.

    Google Scholar 

  14. Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. In 11th international workshop on knowledge management and acquisition for smart systems and services (PKAW 2010) (Vol. 11(5), p. 4767).

  15. Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Elsevier, Security Issues in Sensor and Ad Hoc Networks, 5(1), 35–48.

    Article  Google Scholar 

  16. Chen, H., Wu, H., Hu, J., & Gao, C. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage (pp. 359–364).

  17. Zacharia, G., Moukas, A., & Mae, P. (2000). Collaborative reputation mechanisms for electronic marketplaces. Decision Support Systems, 29(4), 1–7.

    Article  Google Scholar 

  18. Liu, K., Abu-Ghazaleh, N., & Kang, K.-D. (2007). Location verification and trust management for resilient geographic routing. Journal of Parallel and Distributed Computing, 67(2), 215–228.

    Article  Google Scholar 

  19. Liang, Z., & Shi, W. (2010). TRECON: A trust-based economic framework for efficient internet routing. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, 40(1), 52–67.

    Article  Google Scholar 

  20. Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–3289.

    Article  Google Scholar 

  21. Carbo, J., Molina, J. M., & Davila, J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems, 12(1), 135–155.

    Article  Google Scholar 

  22. Carbo, J., Molina, J. M., & Davila, J. (2002). Comparing predictions of SPORAS vs. a fuzzy reputation system. In 3rd international conference on fuzzy sets and fuzzy systems.

  23. Labraoui, N. (2015). A reliable trust management scheme in wireless sensor networks. In 12th international symposium on programming and systems (ISPS 2015) (pp. 1–6). Algiers.

  24. Luo, W., Ma, W., & Gao, Q. (2016). A dynamic trust management system for wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9(7), 613–621.

    Article  Google Scholar 

  25. Monia, Randhawa, S., & Jain, S. (2016). An efficient trust management algorithm in wireless sensor network. In N. R. Shetty, N. Hamsavath Prasad, & N. Nalini (Eds.), Emerging research in computing, information, communication and applications (Vol. 3, pp. 281–287). Singapore: Springer.

    Google Scholar 

  26. Guo, J., Ma, J., & Wan, T. (2017). A mutual evaluation based trust management method for wireless sensor networks. Chinese Journal of Electronics, 26(2), 407–415.

    Article  Google Scholar 

  27. Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, PP(99), 1.

    Google Scholar 

  28. Priayoheswari, B., Kulothungan, K., & Kannan, A. (2016). Beta reputation and direct trust model for secure communication in wireless sensor networks. In Proceeding ICIA-16 proceedings of the international conference on informatics and analytics (Vol. 73).

  29. Babu, S., Raha, A., & Naskar, M. (2014). Trust evaluation based on node’s characteristics and neighbouring nodes’ recommendations for WSN. Wireless Sensor Network, 6(8), 157–172.

    Article  Google Scholar 

  30. Singh, M., & Das, R. (2015). KT3F: A key based two tier trust management filtering scheme for intrusion detection in wireless sensor network. In Proceedings of the 2nd international conference on computer and communication technologies (Springer series) (Vol. 379, pp. 679–690).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rupayan Das.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Das, R., Dash, D. & Sarkar, M.K. HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN. Wireless Pers Commun 112, 1079–1112 (2020). https://doi.org/10.1007/s11277-020-07092-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07092-w

Keywords

Navigation