Skip to main content
Log in

Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Trust and reputation models emerges new facet that aims to provide secure and reliable computations in distributed computational environment. In this manuscript, we propose pervasive explorations of wireless sensor network to investigate the effect of static, dynamic and oscillating modes. Our proposed model constitutes five trust and reputation models namely: bio-inspired trust and reputation, Eigen trust, peer trust, power trust, linguistic fuzzy trust and reputation. The impact of different wireless sensor networks modes has been judged for accuracy, path length and energy consumption over deployed models. Further experimental results have demonstrated to prove the validity of our proposal.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Romer, K., & Mattern, F. (2004). The Design Space of Wireless Sensor Networks. IEEE Wireless Communications, 11(6), 54–61.

    Article  Google Scholar 

  2. Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE, 2(2), 12–22.

    Article  Google Scholar 

  3. MIT Technology Review. (2003). ‘10 Emerging technologies that will change the world. www.Technologyreview.com/read_artical.aspx?id=13060&chinfotech.

  4. Chong, C.-Y., & Kumar, S. P. (2003). Sensor networks: evolution, opportunities and challenges. Proceeding of the IEEE, 91(8), 1247–1256.

    Article  Google Scholar 

  5. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114. doi:10.1109/MCOM.2002.1024422.

    Article  Google Scholar 

  6. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.

    Article  Google Scholar 

  7. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). SecCloud: Bridging Secure Storage and Computation in Cloud. ICDCS Workshops, 2010, 52–61.

    Google Scholar 

  8. Attar, A.Tang, H., Vasilakos, A. V., Richard Yu, F., & Leung, V. C. M. (2012). A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  9. Han, K., Luo, J., Liu, Y., & Vasilakos, A. V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.

    Article  Google Scholar 

  10. Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-Cryptography and Authentication in Body Area Networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.

    Article  Google Scholar 

  11. Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward Incentivizing Anti-Spoofing Deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.

    Article  Google Scholar 

  12. Jing, Q., Vasilakos, A. V., Wan, J., Jingwei, L., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  13. Marsh, S. P. (1994). Formalising trust as a computational concept. Ph.D. thesis, Department of Computing Science and Mathematics, University of Stirling.

  14. Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks, 50(4), 472–484.

    Article  MATH  Google Scholar 

  15. Yan, Z., Zhang, P., & Vasilakos, Athanasios V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  16. Zhang, Y., Li, X., Yang, J., Liu, Y., Xiong, N., & Vasilakos, A. V. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network Multimedia tools and applications, 67(1), 97–117.

    Google Scholar 

  17. He, D., Chen, C., Chan, S., Jiajun, B., & Vasilakos, A. V. (2012). ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  18. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.

    Article  Google Scholar 

  19. Yang, H., Zhang, Y., Zhou, Y., Xiaoming, F., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  20. Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.

    Article  Google Scholar 

  21. Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating Against Attacks on Encrypted Protocols through Traffic-Feature Analysis. IEEE/ACM Trans. Netw., 18(4), 1234–1247.

    Article  Google Scholar 

  22. Yin, X., Fang, B., Jin, S., Qiu, M., Vasilakos, A. V., & Xu, Y. (2015). Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G. International Journal of Communication Systems 1–13.

  23. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks,. doi:10.1002/sec.1243.

    Google Scholar 

  24. Xu, X., Ansari, R., Khokhar, A. A., & Vasilakos, A. V. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45:1–45:25. http://dblp.uni-trier.de/db/journals/tosn/tosn11.html.

  25. Xiang, L., Luo, J., & Rosenberg, C. (2011). Compressed data aggregation for energy efficient wireless sensor networks. SECON, 2011, 46–54.

    Google Scholar 

  26. Peng, Z., Tian Wang, Md., Zakirul, A. B., Xiaoqiang, W., & Wang, G. (2015). Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. IEEE Trans. Computers, 64(7), 1968–1982.

    Article  MathSciNet  Google Scholar 

  27. Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating Congestion + Dilation in Networks via “Quality of Routing” Games. IEEE Trans. Computers, 61(9), 1270–1283.

    Article  MathSciNet  Google Scholar 

  28. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  29. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  30. Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.

    Article  Google Scholar 

  31. Acampora, G., Gaeta, M., Loia, V., & Vasilakos, A. V. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.

    Google Scholar 

  32. Liu, L., Song, Y., Zhang, H., Ma, H., & Vasilakos, A. V. (2015). Physarum Optimization: A Biology-inspired Algorithm for the Steiner Tree Problem in Networks. IEEE Transactions on Computers, 64(3), 819–832.

    MathSciNet  Google Scholar 

  33. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  34. Yang, M., Li, Y., Jin, D., Zeng, L., Xin, W., & Vasilakos, A. V. (2015). Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey” ACM/Springer. Mobile Networks and Applications, 20(1), 4–18.

    Article  Google Scholar 

  35. Xiong, N., Vasilakos, A. V., Yang, L. T., Song, L., Pan, Y., Kannan, R., & Li, Y. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.

    Article  Google Scholar 

  36. Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Ding-Zhu, D., & Vasilakos, A. V. (2012). Tight Performance Bounds of Multi-hop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.

    Article  Google Scholar 

  37. Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii international conference on system sciences. Hawaii, USA.

  38. Gambetta, D. (2000). Can we trust trust? In D. Gambetta (Ed.), Trust: Making and breaking cooperative relations (pp. 213–237). Department of Sociology, University of Oxford, Ch. 13. http://www.nuffield.ox.ac.uk/users/gambetta/Trust_making%20and%20breaking%20cooperative%20relations.pdf.

  39. Almenárez, F., Marín, A., Campo, C., & García, C. (2004). PTM: a Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security and Trust, Boston, USA: Privacy and Trust.

    Google Scholar 

  40. Adamic, L. A. (2002). Zipf, power-laws and pareto—A ranking tutorial. http://www.hpl.hp.com/research/idl/papers/ranking/ranking.html. HP Labs, California.

  41. Buchegger, S. & Boudec, J.-Y. L. (2004). A robust reputation system for P2P and mobile ad hoc networks. In Proceedings of the second workshop economics of P2P systems, June 2004.

  42. Xiong, L., & Liu, L. (2004). PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Trans. Knowledge and Data Eng., 16(7), 843–857.

    Article  Google Scholar 

  43. Sabater, J., & Sierra, C. (2001). REGRET: reputation in gregarious societies. In J. P. Müller, E. Andre, S. Sen, & C. Frasson (Eds.), Proceedings of the fifth international conference on autonomous agents (pp. 194–195). Montreal: CM Press.

    Chapter  Google Scholar 

  44. Almenárez, F., Marín, A., Campo, C., & García, C. (2004). PTM: A pervasive trust management model for dynamic open environments. In: Privacy and trust. First workshop on pervasive security and trust, Boston, USA.

  45. Moloney, M., & Weber, S. (2005). A context-aware trust-based security system for ad hoc networks. Workshop of the 1st international conference on security and privacy for emerging areas in communication networks (pp. 153–160). Athens: Greece.

    Google Scholar 

  46. Tajeddine, A., Kayssi, A., Chehab, A., & Artail, H. (2006). PATROL-F—A comprehensive reputation-based trust model with fuzzy subsystems. In Autonomic and trusted computing, Third international conference, ATC. LNCS (Vol. 4158, pp. 205–217). Wuhan, China: Springer.

  47. Boukerche, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(11–12), 2413–2427.

    Article  Google Scholar 

  48. Sabater, J., & Sierra, C. (2005). Review on computational trust and reputation models. Artificial Intelligence Review, 24(1), 33–60.

    Article  MATH  Google Scholar 

  49. Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.

    Article  Google Scholar 

  50. Mármol, F. G., & Pérez, G. M. (2009). Security Threats Scenarios in Trust and Reputation Models for Distributed Systems. Elsevier Computers & Security, 28(7), 545–556.

    Article  Google Scholar 

  51. Dorigo, M., & Gambardella, L. (1997). Ant colony system: a cooperative learning approach in the traveling salesman problem. IEEE Transaction on Evolutionary Computing, 1(1), 53–66.

    Article  Google Scholar 

  52. Dorigo, M., Gambardella, L., Birattari, M., Martinoli, A., Poli, R., & Stützle, T. (2006). Ant colony optimization and swarm intelligence in LNCS: Vol. 4150. 5th international workshop, ANTS 2006. Brussels: Springer.

  53. Cordón, O., Herrera, F., & Stützle, T. (2002). A review on the ant colony optimization meta heuristic: basis, models and new trends. Mathware and Soft Computing, 9(2–3), 141–175.

    MathSciNet  MATH  Google Scholar 

  54. Dorigo, M., & Stützle, T. (2004). Ant colony optimization. Bradford Book. Cambridge: MIT press. http://golem.iimas.unam.mx/~caleb/IA/Topic3-Optimization/literature/Ant_Colony_Optimization.pdf.

  55. Mármol, F. G., & Pérez, G. M. (2011). Providing Trust in Wireless Sensor Networks using a Bio-Inspired Technique. Telecommunication Systems Journal, 46(2), 163–180.

    Article  Google Scholar 

  56. Kamvar, S., Schlosser, M., & Garcia-Molina, H. (2003). The Eigen Trust algorithm for reputation management in P2P networks. Hungary: Budapest.

    Google Scholar 

  57. Advogato’s Trust Metric (White Paper), Feb. 2000. http://www.advogato.org/trust-metric.html.

  58. Douceur, J. (2002). The sybil attack. In The Proceedings of the first international workshop on peer-to-peer systems first IPTPS, Cambridge, MA.

  59. Zhou, R., & Hwang, K. (2007). PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. Transactions on parallel and distributed systems.

  60. Marmol, F. G., Marin-Blazquez, J. G., & Perez, G. M. (2010). Linguistic fuzzy logic enhancement of a trust mechanism for distributed networks. In CIT ‘10 Proceedings of the 2010 10th IEEE international conference on computer and information technology (pp. 838–845). IEEE Computer Society Washington, DC, USA.

  61. Mármol, F. G., & Pérez, G. M. (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In IEEE international conference on communications (IEEE ICC 2009), communication and information systems security symposium, Dresden, Germany.

  62. Mármol, F. G., & Perez, G., M. (2008). Providing trust in wireless sensor networks using a bio-inspired technique. In Proceedings of the networking and electronic commerce research conference, NAEC’08. Lake Garda, Italy.

  63. Li, L., & Halpern, J. Y. (2001). Minimum-energy, mobile wireless networks revisited. In IEEE International conference on communications, ICC 2001 (Vol. 1, pp. 278–283).

  64. Sánchez, J. A., & Ruiz, P. M. (2006). Improving delivery ratio and power efficiency in unicast geographic routing with a realistic physical layer for wireless sensor networks. In Proceedings of the 9th Euromicro conference on digital system design (DSD’06) (pp. 591–597).

  65. Mármol, F. G., & Pérez, G. M. (2012). TRIP, a Trust and Reputation Infrastructure-based Proposal for Vehicular Ad hoc Networks. Journal of Network and Computer Applications, 35(3), 934–941.

    Article  Google Scholar 

  66. Mármol, F. G., & Pérez, G. M. (2010). Towards Pre-Standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Computer Standards and Interfaces, Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations, 32(4), 185–196.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Surinder Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, V.K., Singh, S. & Pathak, N.P. Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Netw 23, 335–343 (2017). https://doi.org/10.1007/s11276-015-1144-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1144-4

Keywords

Navigation