Abstract
Trust and reputation models emerges new facet that aims to provide secure and reliable computations in distributed computational environment. In this manuscript, we propose pervasive explorations of wireless sensor network to investigate the effect of static, dynamic and oscillating modes. Our proposed model constitutes five trust and reputation models namely: bio-inspired trust and reputation, Eigen trust, peer trust, power trust, linguistic fuzzy trust and reputation. The impact of different wireless sensor networks modes has been judged for accuracy, path length and energy consumption over deployed models. Further experimental results have demonstrated to prove the validity of our proposal.
Similar content being viewed by others
References
Romer, K., & Mattern, F. (2004). The Design Space of Wireless Sensor Networks. IEEE Wireless Communications, 11(6), 54–61.
Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE, 2(2), 12–22.
MIT Technology Review. (2003). ‘10 Emerging technologies that will change the world. www.Technologyreview.com/read_artical.aspx?id=13060&chinfotech.
Chong, C.-Y., & Kumar, S. P. (2003). Sensor networks: evolution, opportunities and challenges. Proceeding of the IEEE, 91(8), 1247–1256.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114. doi:10.1109/MCOM.2002.1024422.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.
Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). SecCloud: Bridging Secure Storage and Computation in Cloud. ICDCS Workshops, 2010, 52–61.
Attar, A.Tang, H., Vasilakos, A. V., Richard Yu, F., & Leung, V. C. M. (2012). A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions. Proceedings of the IEEE, 100(12), 3172–3186.
Han, K., Luo, J., Liu, Y., & Vasilakos, A. V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.
Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-Cryptography and Authentication in Body Area Networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.
Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward Incentivizing Anti-Spoofing Deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.
Jing, Q., Vasilakos, A. V., Wan, J., Jingwei, L., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Marsh, S. P. (1994). Formalising trust as a computational concept. Ph.D. thesis, Department of Computing Science and Mathematics, University of Stirling.
Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks, 50(4), 472–484.
Yan, Z., Zhang, P., & Vasilakos, Athanasios V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.
Zhang, Y., Li, X., Yang, J., Liu, Y., Xiong, N., & Vasilakos, A. V. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network Multimedia tools and applications, 67(1), 97–117.
He, D., Chen, C., Chan, S., Jiajun, B., & Vasilakos, A. V. (2012). ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.
Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.
Yang, H., Zhang, Y., Zhou, Y., Xiaoming, F., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.
Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.
Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating Against Attacks on Encrypted Protocols through Traffic-Feature Analysis. IEEE/ACM Trans. Netw., 18(4), 1234–1247.
Yin, X., Fang, B., Jin, S., Qiu, M., Vasilakos, A. V., & Xu, Y. (2015). Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G. International Journal of Communication Systems 1–13.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks,. doi:10.1002/sec.1243.
Xu, X., Ansari, R., Khokhar, A. A., & Vasilakos, A. V. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45:1–45:25. http://dblp.uni-trier.de/db/journals/tosn/tosn11.html.
Xiang, L., Luo, J., & Rosenberg, C. (2011). Compressed data aggregation for energy efficient wireless sensor networks. SECON, 2011, 46–54.
Peng, Z., Tian Wang, Md., Zakirul, A. B., Xiaoqiang, W., & Wang, G. (2015). Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. IEEE Trans. Computers, 64(7), 1968–1982.
Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating Congestion + Dilation in Networks via “Quality of Routing” Games. IEEE Trans. Computers, 61(9), 1270–1283.
Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.
Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.
Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.
Acampora, G., Gaeta, M., Loia, V., & Vasilakos, A. V. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.
Liu, L., Song, Y., Zhang, H., Ma, H., & Vasilakos, A. V. (2015). Physarum Optimization: A Biology-inspired Algorithm for the Steiner Tree Problem in Networks. IEEE Transactions on Computers, 64(3), 819–832.
Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.
Yang, M., Li, Y., Jin, D., Zeng, L., Xin, W., & Vasilakos, A. V. (2015). Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey” ACM/Springer. Mobile Networks and Applications, 20(1), 4–18.
Xiong, N., Vasilakos, A. V., Yang, L. T., Song, L., Pan, Y., Kannan, R., & Li, Y. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.
Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Ding-Zhu, D., & Vasilakos, A. V. (2012). Tight Performance Bounds of Multi-hop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.
Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii international conference on system sciences. Hawaii, USA.
Gambetta, D. (2000). Can we trust trust? In D. Gambetta (Ed.), Trust: Making and breaking cooperative relations (pp. 213–237). Department of Sociology, University of Oxford, Ch. 13. http://www.nuffield.ox.ac.uk/users/gambetta/Trust_making%20and%20breaking%20cooperative%20relations.pdf.
Almenárez, F., Marín, A., Campo, C., & García, C. (2004). PTM: a Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security and Trust, Boston, USA: Privacy and Trust.
Adamic, L. A. (2002). Zipf, power-laws and pareto—A ranking tutorial. http://www.hpl.hp.com/research/idl/papers/ranking/ranking.html. HP Labs, California.
Buchegger, S. & Boudec, J.-Y. L. (2004). A robust reputation system for P2P and mobile ad hoc networks. In Proceedings of the second workshop economics of P2P systems, June 2004.
Xiong, L., & Liu, L. (2004). PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Trans. Knowledge and Data Eng., 16(7), 843–857.
Sabater, J., & Sierra, C. (2001). REGRET: reputation in gregarious societies. In J. P. Müller, E. Andre, S. Sen, & C. Frasson (Eds.), Proceedings of the fifth international conference on autonomous agents (pp. 194–195). Montreal: CM Press.
Almenárez, F., Marín, A., Campo, C., & García, C. (2004). PTM: A pervasive trust management model for dynamic open environments. In: Privacy and trust. First workshop on pervasive security and trust, Boston, USA.
Moloney, M., & Weber, S. (2005). A context-aware trust-based security system for ad hoc networks. Workshop of the 1st international conference on security and privacy for emerging areas in communication networks (pp. 153–160). Athens: Greece.
Tajeddine, A., Kayssi, A., Chehab, A., & Artail, H. (2006). PATROL-F—A comprehensive reputation-based trust model with fuzzy subsystems. In Autonomic and trusted computing, Third international conference, ATC. LNCS (Vol. 4158, pp. 205–217). Wuhan, China: Springer.
Boukerche, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(11–12), 2413–2427.
Sabater, J., & Sierra, C. (2005). Review on computational trust and reputation models. Artificial Intelligence Review, 24(1), 33–60.
Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.
Mármol, F. G., & Pérez, G. M. (2009). Security Threats Scenarios in Trust and Reputation Models for Distributed Systems. Elsevier Computers & Security, 28(7), 545–556.
Dorigo, M., & Gambardella, L. (1997). Ant colony system: a cooperative learning approach in the traveling salesman problem. IEEE Transaction on Evolutionary Computing, 1(1), 53–66.
Dorigo, M., Gambardella, L., Birattari, M., Martinoli, A., Poli, R., & Stützle, T. (2006). Ant colony optimization and swarm intelligence in LNCS: Vol. 4150. 5th international workshop, ANTS 2006. Brussels: Springer.
Cordón, O., Herrera, F., & Stützle, T. (2002). A review on the ant colony optimization meta heuristic: basis, models and new trends. Mathware and Soft Computing, 9(2–3), 141–175.
Dorigo, M., & Stützle, T. (2004). Ant colony optimization. Bradford Book. Cambridge: MIT press. http://golem.iimas.unam.mx/~caleb/IA/Topic3-Optimization/literature/Ant_Colony_Optimization.pdf.
Mármol, F. G., & Pérez, G. M. (2011). Providing Trust in Wireless Sensor Networks using a Bio-Inspired Technique. Telecommunication Systems Journal, 46(2), 163–180.
Kamvar, S., Schlosser, M., & Garcia-Molina, H. (2003). The Eigen Trust algorithm for reputation management in P2P networks. Hungary: Budapest.
Advogato’s Trust Metric (White Paper), Feb. 2000. http://www.advogato.org/trust-metric.html.
Douceur, J. (2002). The sybil attack. In The Proceedings of the first international workshop on peer-to-peer systems first IPTPS, Cambridge, MA.
Zhou, R., & Hwang, K. (2007). PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. Transactions on parallel and distributed systems.
Marmol, F. G., Marin-Blazquez, J. G., & Perez, G. M. (2010). Linguistic fuzzy logic enhancement of a trust mechanism for distributed networks. In CIT ‘10 Proceedings of the 2010 10th IEEE international conference on computer and information technology (pp. 838–845). IEEE Computer Society Washington, DC, USA.
Mármol, F. G., & Pérez, G. M. (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In IEEE international conference on communications (IEEE ICC 2009), communication and information systems security symposium, Dresden, Germany.
Mármol, F. G., & Perez, G., M. (2008). Providing trust in wireless sensor networks using a bio-inspired technique. In Proceedings of the networking and electronic commerce research conference, NAEC’08. Lake Garda, Italy.
Li, L., & Halpern, J. Y. (2001). Minimum-energy, mobile wireless networks revisited. In IEEE International conference on communications, ICC 2001 (Vol. 1, pp. 278–283).
Sánchez, J. A., & Ruiz, P. M. (2006). Improving delivery ratio and power efficiency in unicast geographic routing with a realistic physical layer for wireless sensor networks. In Proceedings of the 9th Euromicro conference on digital system design (DSD’06) (pp. 591–597).
Mármol, F. G., & Pérez, G. M. (2012). TRIP, a Trust and Reputation Infrastructure-based Proposal for Vehicular Ad hoc Networks. Journal of Network and Computer Applications, 35(3), 934–941.
Mármol, F. G., & Pérez, G. M. (2010). Towards Pre-Standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Computer Standards and Interfaces, Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations, 32(4), 185–196.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Verma, V.K., Singh, S. & Pathak, N.P. Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Netw 23, 335–343 (2017). https://doi.org/10.1007/s11276-015-1144-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1144-4