Skip to main content
Log in

Providing trust in wireless sensor networks using a bio-inspired technique

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSNs) are becoming more and more spread and both industry and academia are focusing their research efforts in order to improve their applications. One of the first issues to solve in order to achieve that expected improvement is to assure a minimum level of security in such a restrictive environment. Even more, ensuring confidence between every pair of interacting nodes is a critical issue in this kind of networks. Under these conditions we present in this paper a bio-inspired trust and reputation model, called BTRM-WSN, based on ant colony systems aiming at providing trust and reputation in WSNs. Experiments and results demonstrate the accuracy, robustness and lightness of the proposed model in a wide set of situations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Römer, K., & Mattern, F. (2004). The design space of wireless sensor networks. IEEE Wireless Communications, 11(6), 54–61.

    Article  Google Scholar 

  2. Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: a survey. Vehicular Technology Magazine IEEE, 2(2), 12–22.

    Article  Google Scholar 

  3. Marsh, S. P. (1994). Formalising trust as a computational concept. PhD thesis, Department of Computing Science and Mathematics, University of Stirling.

  4. Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks, 50(4), 472–484.

    Article  Google Scholar 

  5. Dorigo, M., & Gambardella, L. (1997). Ant colony system: a cooperative learning approach in the traveling salesman problem. IEEE Transaction on Evolutionary Computing, 1(1), 53–66.

    Article  Google Scholar 

  6. Dorigo, M., Gambardella, L., Birattari, M., Martinoli, A., Poli, R., & Stützle, T. (2006). Ant colony optimization and swarm intelligence. In LNCS : Vol. 4150. 5th international workshop, ANTS 2006. Brussels: Springer.

    Google Scholar 

  7. Cordón, O., Herrera, F., & Stützle, T. (2002). A review on the ant colony optimization metaheuristic: basis, models and new trends. Mathware and Soft Computing, 9(2–3), 141–175.

    Google Scholar 

  8. Dorigo, M., & Stützle, T. (2004). Ant colony optimization. Bradford Book

  9. Boukerche, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(11–12), 2413–2427.

    Article  Google Scholar 

  10. Dhurandher, S. K., Misra, S., Obaidat, M. S., & Gupta, N. (2009). An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Security and Communication Networks, 2(2), 215–224.

    Article  Google Scholar 

  11. Chen, H., Wu, H., Zhou, X., & Gao, C. (2007). Agent-based trust model in wireless sensor networks. In Eighth ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing, SNPD’03 (pp. 119–124).

  12. Ganeriwal, S., & Srivastava, M. B. (2004). Reputation-based framework for high integrity sensor networks. In SASN’04: Proceedings of the 2nd ACM workshop on security of Ad hoc and sensor networks (pp. 66–77). New York: ACM.

    Chapter  Google Scholar 

  13. Michiardi, P., & Molva, R. (2002). CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security (pp. 107–121). Deventer: Kluwer, B.V.

    Google Scholar 

  14. Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: distributed reputation-based beacon trust system. In DASC’06: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing (pp. 277–283). Washington: IEEE Computer Society.

    Chapter  Google Scholar 

  15. Buchegger, S., & Le Boudec, J. Y. (2004). A robust reputation system for P2P and mobile Ad-hoc networks. In Proceedings of the second workshop on the economics of peer-to-peer systems, Cambridge MA, USA.

  16. Buchegger, S., & Boudec, J.-Y. L. (2002). Performance analysis of the CONFIDANT protocol: cooperation of nodes. In Proceedings of IEEE/ACM symposium on mobile Ad hoc networking and computing (MobiHOC). Lausanne: IEEE.

    Google Scholar 

  17. Almenárez, F., Marín, A., Campo, C., & García, C. (2004). PTM: a pervasive trust management model for dynamic open environments. In Privacy and trust, first workshop on pervasive security and trust, Boston, USA.

  18. Glover, F. W., & Kochenberger, G. A. (2003). Handbook of metaheuristics (International series in operations research & management science). Berlin: Springer.

    Google Scholar 

  19. Li, L., & Halpern, J. Y. (2001). Minimum-energy, mobile wireless networks revisited. In IEEE International Conference on Communications, ICC 2001 (Vol. 1, pp. 278–283).

  20. Sánchez, J.A., & Ruiz, P.M. (2006). Improving delivery ratio and power efficiency in unicast geographic routing with a realistic physical layer for wireless sensor networks. In Proc. 9th Euromicro conference on digital system design (DSD’06) (pp. 591–597).

  21. Gómez, M.F. TRMSim-WSN, a trust & reputation models simulator for wireless sensor networks, http://ants.dif.um.es/~felixgm/research/trmsim-wsn.

  22. Xiong, L., & Liu, L. (2004). PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Félix Gómez Mármol.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gómez Mármol, F., Martínez Pérez, G. Providing trust in wireless sensor networks using a bio-inspired technique. Telecommun Syst 46, 163–180 (2011). https://doi.org/10.1007/s11235-010-9281-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-010-9281-7

Keywords

Navigation