Skip to main content
Log in

A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are susceptible to many security threats and are specifically prone to physical node capture in which the adversary can easily launch the so-called insider attacks such as node compromise, bypassing the traditional security mechanisms based on cryptography primitives. So, the compromised nodes can be modified to misbehave and disrupt the entire network and can successfully perform the authentication process with their neighbors, which have no way to distinguish fraudulent nodes from trustworthy ones. Trust and reputation systems have been recently suggested as a powerful tools and an attractive complement to cryptography-based schemes in securing WSNs. They provide ability to detect and isolate both faulty and malicious nodes. Considerable research has been done on modeling and managing trust and reputation. However, trust topic issue in WSNs remains an open and challenging field. In this paper, we propose a Risk-aware Reputation-based Trust (RaRTrust) model for WSNs. Our novel framework uses both reputation and risk to evaluate trustworthiness of a sensor node. Risk evaluation is used to deal with the dramatic spoiling of nodes, which makes RaRTrust robust to on–off attack and differ from other trust models based only on reputation. This paper contributes to model the risk as opinion of short-term trustworthiness combining with traditional reputation evaluation to derive trustworthiness in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Akyldiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.

    Article  Google Scholar 

  2. Louazani, A., Sekhri, L., & Kechar, B. (2014). A security scheme against wormhole attack in MAC layer for delay sensitive wireless sensor networks. International Journal of Information Technology and Computer Science (IJITCS), 6(12), 1–10.

    Article  Google Scholar 

  3. Louazani, A., Sekhri, L., & Kechar, B. (2013). A time petri net model for wormhole attack detection in wireless sensor networks. In 4th IEEE technical co-sponsored international conference on smart communications in network technologies (SaCoNeT).

  4. Zahariadis, T., Trakadas, P., Leligou, H., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–825.

    Article  Google Scholar 

  5. Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communication of the ACM, 47(6), 53–57.

  6. Labraoui, N., Gueroui, M., Aliouat, M., & Zia, T. (2011). Data aggregation security challenge in wireless sensor networks, a survey. Ad hoc & Sensor Networks International Journal, 12(3–4), 295–324.

    Google Scholar 

  7. Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.

    Article  Google Scholar 

  8. Labraoui, N., Gueroui, M., Aliouat, M., & Petit, J. (2013). Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication Systems, 54(1), 3–17.

    Article  Google Scholar 

  9. Dhulipala, V. R. S., Karthik, N., & Chandrasekaran, R. M. (2013). A novel heuristic approach based trustworthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.

    Article  Google Scholar 

  10. Shaikh, R. A., Jameel, H., DAuriol, B. J., Lee, H. J., Lee, S. Y., & Song, Y. J. (2009). Group based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(1), 1698–1712.

    Article  Google Scholar 

  11. Alzaid, H., Alfaraj, M., Ries, S., Jsang, A., Albabtain, M., & Abuhaimed, A. (2013). Reputation-based trust systems for wireless sensor networks: A comprehensive review. IFIP Advances in Information and Communication Technology, 401, 66–82.

    Article  Google Scholar 

  12. Ganeriwal, S., & Srivastava, M. (2004). Reputation-based framework for high integrity sensor networks. In 2nd ACM workshop on Security of ad hoc and sensor networks (SASN).

  13. Jsang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Conference on Electronic Commerce (Bled).

  14. ElSalamouny, E., Krukow, K., & Sassone, V. (2009). An analysis of the exponential decay principle in probabilistic trust models. Theoretical Computer Science, 410(41), 4067–4084.

    Article  MathSciNet  MATH  Google Scholar 

  15. Yanli, Y., Keqiu, L., & Ping, L. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.

    Article  Google Scholar 

  16. Yao, Z., Kim, D., Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In IEEE international conference on mobile ad hoc and sensor systems (MASS) (pp. 437–446).

  17. Boukerche, A., Li, X., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Commununications, 30(1), 2413–2427.

    Google Scholar 

  18. Daojing, H., Chun, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions of Information Technology in Biomedecine, 16(1), 623–632.

    Article  Google Scholar 

  19. Guangjie, H., Jinfang, J., Lei, S., Jianwei, N., & Han-Chieh, C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.

    Article  MATH  Google Scholar 

  20. Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618.

    Article  Google Scholar 

  21. Whitby, A., Josang, A., & Indulska, J. (2004). Filtering out unfair ratings in Bayesian reputation systems. In 3rd international joint conference on autonomous agenst and multi agent systems (pp. 106–117).

  22. Weng, J., Miao, C., & Goh, A. (2006). An entropy-based approach to protecting rating systems from unfair testimonies. IEICE Transactions on Information and Systems, E89D(9), 2502–2511.

  23. Feng, J., Zhang, Y., & Wang, H. (2010). A trust management model based on bi-evaluation in p2p networks. IEICE Transactions on Information and Systems, 93(1), 466–472.

    Article  Google Scholar 

  24. Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions of Information Forensics Security, 8(1), 924–993.

    Article  Google Scholar 

  25. Sun, Y., Han, Z., & Liu, K. J. R. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communication Magazine, 46(2), 112–119.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nabila Labraoui.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Labraoui, N., Gueroui, M. & Sekhri, L. A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks. Wireless Pers Commun 87, 1037–1055 (2016). https://doi.org/10.1007/s11277-015-2636-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2636-3

Keywords

Navigation