Skip to main content

Advertisement

Log in

RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Trust estimation approaches in wireless sensor networks (WSNs) are mainly used to improve security, reliability, system efficiency, lifespan, decision-making, and collaboration (dependability) among sensor nodes. There are various existing trust estimation approaches incompetent to satisfy the fundamental requirements of WSN, like resource (power, energy, communication bandwidth) efficiency, long network lifetime, node availability, communication, and memory overheads. In this paper, we provide an efficient and accurate weight-based trust management approach that employs communication (direct, indirect) trust and data trust along with compressive sensing technique to alleviate several internal attacks like badmouthing, black-hole, and grey-hole attacks for clustered WSN. The core part of the proposed scheme is an efficient trust estimation function. The proposed trust estimation function computes the communication trust as well as data trust to analyze the cooperation level and data consistency respectively for better decision making. Although, existing schemes do not incorporate data trust during trust evaluation which leads to incorrect trust decisions. Moreover, the proposed reliable trust model which is known as RTM that provides adaptability and flexibility in terms of application requirements with reduced transmission overhead. RTM employs a simple, lightweight, and flexible approach for trust estimation. RTM uses a hybrid approach within clusters as well as with clusters to reduce communication overhead.RTM employs the concept of a directly (direct) trusted node and resolves the weight-assignment problem of existing weighted trust models of WSNs. Furthermore, this paper presents motivation and vision for WSNs as well as emphasizes the strength of the weighted approach by assigning suitable weights according to application requirements. The proposed trust model has been compared with the existing state-of-the-art trust models such as LDTS, LWTM, etc. Experimental results demonstrate excellent performance in terms of malicious behavior detection, prevention, the detection accuracy of selfish nodes, cooperation, as well as resource efficiency to protect WSN. RTM can detect 2.10%, 12.63%, 15.78% more malicious nodes than LWTM (Singh et al. in IETE J Res 63(3):297–308, 2017), ADCT (Talbi et al. in Telecommun Syst 65(4):605–619, 2017), LDTS (Li et al. in IEEE Trans Inf Forensics Secur 8(6):924–935, 2013) respectively in the network consisting of 500 nodes. Moreover, RTM can accurately detect 10%, and 12% more malicious nodes than LTS (Khan et al. in IEEE Access 7:58221–58240, 2019) and ADCT respectively in the presence of malicious nodes. Furthermore, RTM has 50%, 98% less inter-cluster communication overhead than LWTM, and ADCT in the presence of 100 clusters in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27

Similar content being viewed by others

Data availability

The datasets generated and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Momani, M. (2010). Trust models in wireless sensor networks: A survey. In International conference on network security and applications. Springer.

  2. Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662–667.

    Google Scholar 

  3. Nayak, P., & Vathasavai, B. (2017). Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic. IEEE Sensors Journal, 17(14), 4492–4499.

    Google Scholar 

  4. Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Sensors Journal, 12(10), 2941–2949.

    Google Scholar 

  5. Kimoto, A., Sugitani, N., & Fujisaki, S. (2010). A multifunctional tactile sensor based on PVDF films for identification of materials. IEEE Sensors Journal, 10(9), 1508–1513.

    Google Scholar 

  6. Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.

    Google Scholar 

  7. Ganeriwal, S., & Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop security of ad hoc and sensor networks (SASN ’04) (pp. 66–67).

  8. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the third IEEE international conference on mobile ad-hoc and sensor systems (MASS ’06) (pp. 437–446).

  9. Boukerche, A., Li, X., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30, 2413–2427.

    Google Scholar 

  10. Zhang, J., et al. (2010). A trust management architecture for hierarchical wireless sensor networks. In IEEE local computer network conference. IEEE.

  11. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.

    Google Scholar 

  12. Li, X., Zhou, F., & Junping, Du. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.

    Google Scholar 

  13. Frampton, K. D. (2006). Acoustic self-localization in a distributed sensor network. IEEE Sensors Journal, 6(1), 166–172.

    Google Scholar 

  14. Kumar, A., Srivastava, V., Singh, M. K., & Hancke, G. P. (2014). Current status of the IEEE 1451 standard-based sensor applications. IEEE Sensors Journal, 15(5), 2505–2513.

    Google Scholar 

  15. Singh, M., et al. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297–308.

    Google Scholar 

  16. Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor networks. IEEE Transactions on Wireless Communications, 10(11), 3973–3983.

    Google Scholar 

  17. Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, 18(15), 6446–6460.

    Google Scholar 

  18. Wu, X., Huang, J., Ling, J., & Shu, L. (2019). BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access, 7, 43679–43690.

    Google Scholar 

  19. Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869.

    Google Scholar 

  20. Yang, L., Yinzhi, Lu., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404–71412.

    Google Scholar 

  21. Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.

    Google Scholar 

  22. Talbi, S., et al. (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommunication Systems, 65(4), 605–619.

    Google Scholar 

  23. Ishmanov, F., Kim, S., & Nam, S. (2014). A secure trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.

    Google Scholar 

  24. Górski, J., & Turower, A. (2018). A method of trust management in wireless sensor networks. International Journal of Security, Privacy, and Trust Management, 7, 1–19.

    Google Scholar 

  25. Rani, R., Kumar, S., & Dohare, U. (2019). Trust evaluation for light weight security in sensor enabled internet of things: Game theory oriented approach. IEEE Internet of Things Journal, 6(5), 8421–8432.

    Google Scholar 

  26. Meng, W., Choo, K.-K.R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management, 15(2), 761–773.

    Google Scholar 

  27. Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144.

    Google Scholar 

  28. Khan, T., Singh, K., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering-based approach for large scale wireless sensor networks. IEEE Access, 7, 58221–58240.

    Google Scholar 

  29. AlSkaif, T., Zapata, M. G., & Bellalta, B. (2015). Game theory for energy efficiency in wireless sensor networks: Latest trends. Journal of Network and Computer Applications, 54, 33–61.

    Google Scholar 

  30. Abrardo, A., Balucanti, L., & Mecocci, A. (2013). A game theory distributed approach for energy optimization in WSNs. ACM Transactions on Sensor Networks (TOSN), 9(4), 44.

    Google Scholar 

  31. Ai, X., Srinivasan, V., & Tham, C.-K. (2008). Optimality and complexity of pure Nash equilibria in the coverage game. IEEE Journal on Selected Areas in Communications, 26(7), 1170–1182.

    Google Scholar 

  32. Asadi, M., Zimmerman, C., & Agah, A. (2013). A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security, 15(1), 50–58.

    Google Scholar 

  33. Bharathi, M. A., & Vijaya Kumar, B. P. (2012). Reverse game theory approach for aggregator nodes selection with ant colony optimization based routing in wireless sensor network. International Journal of Computer Science Issues (IJCSI), 9(6), 292.

    Google Scholar 

  34. Cano, C., Bellalta, B., Sfairopoulou, A., & Barceló, J. (2009). A low power listening MAC with scheduled wake up after transmissions for WSNs. IEEE Communications Letters, 13(4), 221–223.

    Google Scholar 

  35. Chao, C.-M., & Hsiao, T.-Y. (2014). Design of structure-free and energy-balanced data aggregation in wireless sensor networks. Journal of Network and Computer Applications, 37, 229–239.

    Google Scholar 

  36. Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54(18), 3421–3430.

    MATH  Google Scholar 

  37. Chen, Z., Qiao, C., Qiu, Y., Li, Xu., & Wei, Wu. (2014). Dynamics stability in wireless sensor networks active defense model. Journal of Computer and System Sciences, 80(8), 1534–1548.

    MathSciNet  MATH  Google Scholar 

  38. Dai, L., Chang, Y., & Shen, Z. (2011). A non-cooperative game algorithm for task scheduling in wireless sensor networks. International Journal of Computers Communications and Control, 6(4), 592–602.

    Google Scholar 

  39. Delicato, F., Protti, F., De Rezende, J. F., Rust, L., & Pirmez, L. (2005). Application-driven node management in multihop wireless sensor networks. In International conference on networking (pp. 569–576). Springer.

  40. Duan, J., Gao, D., Yang, D., Foh, C. H., & Chen, H.-H. (2014). An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet of Things Journal, 1(1), 58–69.

    Google Scholar 

  41. Edalat, N., Tham, C.-K., & Xiao, W. (2012). An auction-based strategy for distributed task allocation in wireless sensor networks. Computer Communications, 35(8), 916–928.

    Google Scholar 

  42. Guerrero-Zapata, M., Zilan, R., Barceló-Ordinas, J. M., Bicakci, K., & Tavli, B. (2010). The future of security in wireless multimedia sensor networks. Telecommunication Systems, 45(1), 77–91.

    Google Scholar 

  43. Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.

    Google Scholar 

  44. Hao, X.-C., Zhang, Y.-X., Jia, N., & Liu, B. (2013). Virtual game-based energy balanced topology control algorithm for wireless sensor networks. Wireless personal communications, 69(4), 1289–1308.

    Google Scholar 

  45. Hao, X.-C., Gong, Q.-Q., Hou, S., & Liu, B. (2014). Joint channel allocation and power control optimal algorithm based on non-cooperative game in wireless sensor networks. Wireless personal communications, 78(2), 1047–1061.

    Google Scholar 

  46. He, X., & Gui, X. (2009). The localized area coverage algorithm based on game-theory for WSN. JNW, 4(10), 1001–1008.

    Google Scholar 

  47. Jing, H., & Aida, H. (2010). Cooperative clustering algorithms for wireless sensor networks. Smart Wireless Sensor Networks, 2010, 157.

    Google Scholar 

  48. Karl, H., & Willig, A. (2007). Protocols and architectures for wireless sensor networks. Wiley.

    Google Scholar 

  49. Komali, R. S., MacKenzie, A. B., & Gilles, R. P. (2008). Effect of selfish node behavior on efficient topology design. IEEE Transactions on Mobile Computing, 7(9), 1057–1070.

    Google Scholar 

  50. Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking (TON), 14(6), 1167–1178.

    Google Scholar 

  51. Wu, R., Deng, X., Rongxing, Lu., & Shen, X. (2015). Trust-based anomaly detection in emerging sensor networks. International Journal of Distributed Sensor Networks, 11(10), 363569.

    Google Scholar 

  52. Henna, S. (2017). Energy efficient fault tolerant coverage in wireless sensor networks. Journal of Sensors, 2017, 7090782.

    Google Scholar 

  53. Langendoen, K., & Meier, A. (2010). Analyzing MAC protocols for low data-rate applications. ACM Transactions on Sensor Networks (TOSN), 7(2), 19.

    Google Scholar 

  54. Liao, W.-H., Kao, Y., & Fan, C.-M. (2008). Data aggregation in wireless sensor networks using ant colony algorithm. Journal of Network and Computer Applications, 31(4), 387–401.

    Google Scholar 

  55. Liu, A.-F., Zhang, P.-H., & Chen, Z.-G. (2011). Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. Journal of Parallel and Distributed Computing, 71(10), 1327–1355.

    MATH  Google Scholar 

  56. Liu, H., Liu, G., Liu, Y., Mo, L., & Chen, H. (2014). Adaptive quantization for distributed estimation in energy-harvesting wireless sensor networks: A game-theoretic approach. International Journal of Distributed Sensor Networks, 10(7), 217918.

    Google Scholar 

  57. Luo, J., Pan, C., Li, R., & Ge, F. (2012). Power control in distributed wireless sensor networks based on noncooperative game theory. International Journal of Distributed Sensor Networks, 8(12), 398460.

    Google Scholar 

  58. Meshkati, F., Vincent Poor, H., & Schwartz, S. C. (2007). Energy-efficient resource allocation in wireless networks: An overview of game-theoretic approaches. arXiv:0705.1787

  59. Nasser N,ChenY.SEEM:secure and energy-efficient multipath routing protocol for wireless sensor networks.ComputCommun2007;30(11–12):2401–12.

  60. Pandana, C., Han, Z., & Ray Liu, K. J. (2008). Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks. IEEE Transactions on Wireless Communications, 7(8), 3150–3163.

    Google Scholar 

  61. Pantazis, N. A. (2007). Survey on power control issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 9(4), 86–107.

    MathSciNet  Google Scholar 

  62. Yin, X., & Li, S. (2019). Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 198.

    MathSciNet  Google Scholar 

  63. Muaddi, A. B., & Tomko, A. A. (2008). Intrusion detection system for wireless networks. U.S. Patent 7,366,148, issued April 29, 2008.

  64. Wu, X., Chen, G., & Das, S. K. (2008). Avoiding energy holes in wireless sensor networks with nonuniform node distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 710–720.

    Google Scholar 

  65. Younis, M., Senturk, I. F., Akkaya, K., Lee, S., & Senel, F. (2014). Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks, 58, 254–283.

    Google Scholar 

  66. Rathore, H., Badarla, V., & George, K. J. (2016). Sociopsychological trust model for wireless sensor networks. Journal of Network and Computer Applications, 62, 75–87.

    Google Scholar 

  67. Zarifzadeh, S., & Yazdani, N. (2013). Neighbor selection game in wireless ad hoc networks. Wireless Personal Communications, 70(2), 617–640.

    Google Scholar 

  68. Zeydan, E., Kivanc, D., Comaniciu, C., & Tureli, U. (2012). Energy-efficient routing for correlated data in wireless sensor networks. Ad Hoc Networks, 10(6), 962–975.

    Google Scholar 

  69. Zheng, J., Bhuiyan, M. Z. A., Liang, S., Xing, X., & Wang, G. (2014). Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Generation Computer Systems, 39, 88–99.

    Google Scholar 

  70. Zhang, H., & Hou, J. C. (2005). On the upper bound of α-lifetime for large sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 272–300.

    Google Scholar 

  71. Pandey, A., & Tripathi, R. C. (2010). A survey on wireless sensor networks security. International Journal of Computer Applications, 3(2), 43–49.

    Google Scholar 

  72. Sahoo, R. R., Singh, M., Sahoo, B. M., Majumder, K., Ray, S., & Sarkar, S. K. (2013). A light weight trust based secure and energy efficient clustering in wireless sensor network: honey bee mating intelligence approach. Procedia Technology, 10, 515–523.

    Google Scholar 

  73. Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. (2019). TBRS: A trust based recommendation scheme for vehicular CPS network. Future Generation Computer Systems, 92, 383–398.

    Google Scholar 

  74. Feng, R., Han, X., Liu, Q., & Ning, Yu. (2015). A credible Bayesian-based trust management scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 11(11), 678926.

    Google Scholar 

  75. Rehman, E., Sher, M., Abbas Naqvi, S. H., Khan, K. B., & Ullah, K. (2017). Energy efficient secure trust based clustering algorithm for mobile wireless sensor network. Journal of Computer Networks and Communications, 2017, 1–8.

    Google Scholar 

  76. Wang, T., Zhang, G., Alam Bhuiyan, M. D. Z., Liu, A., Jia, W., & Xie, M. (2018). A novel trust mechanism based on fog computing in sensor–cloud system. Future Generation Computer Systems, 109, 573–582.

    Google Scholar 

  77. Kumar, A., Singh, K., & Khan, T. (2021). L-RTAM: Logarithm based reliable trust assessment model for WBSNs. Journal of Discrete Mathematical Sciences and Cryptography, 24(6), 1701–1716.

    MATH  Google Scholar 

  78. Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.

    MATH  Google Scholar 

  79. Kumar, A., Singh, K., Khan, T., Ahmadian, A., Saad, M. H. M., & Manjul, M. (2021). ETAS: An efficient trust assessment scheme for BANs. IEEE Access, 9, 83214–83233.

    Google Scholar 

  80. Anwar, R. W., Zainal, A., Outay, F., Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605–616.

    Google Scholar 

  81. Fang, W., Zhang, C., Shi, Z., Zhao, Q., & Shan, L. (2016). BTRES: Beta-based trust and reputation evaluation system for wireless sensor networks. Journal of Network and Computer Applications, 59, 88–94.

    Google Scholar 

  82. Thirunarayan, K., Anantharam, P., Henson, C., & Sheth, A. (2014). Comparative trust management with applications: Bayesian approaches emphasis. Future Generation Computer Systems, 31, 182–199.

    Google Scholar 

  83. Song,F., & Zhao, B. (2008). Trust-based LEACH protocol for wireless sensor networks. In 2nd international conference on future generation communication and networking (pp.202–207).

  84. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22–42.

    MathSciNet  MATH  Google Scholar 

  85. Shi, Y., & Thomas Hou, Y. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.

    Google Scholar 

  86. Cheikhrouhou, O. (2016). Secure group communication in wireless sensor networks: A survey. Journal of Network and Computer Applications, 61, 115–132.

    Google Scholar 

  87. Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.

    MATH  Google Scholar 

  88. Ishmanov, F., Kim, S., & Nam, S. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3), 7040–7061.

    Google Scholar 

  89. Aziz, A., Singh, K., Osamy, W., & Khedr, A. M. (2019). Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. Journal of Network and Computer Applications, 126, 12–28.

    Google Scholar 

  90. Zhang, T., Yan, L., & Yang, Y. (2018). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks, 24(3), 777–797.

    Google Scholar 

  91. Meng, W., Li, W., Chunhua, S., Zhou, J., & Rongxing, L. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, 7234–7243.

    Google Scholar 

  92. Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for Ad-Hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379.

    Google Scholar 

  93. Min, J., Kim, J., & Kwon, Y. (2012). Data compression technique for wireless sensor networks. In International conference on hybrid information technology (pp. 9–16). Springer.

  94. Chen, S., Liu, J., Wang, K., & Meng, Wu. (2019). A hierarchical adaptive spatio-temporal data compression scheme for wireless sensor networks. Wireless Networks, 25(1), 429–438.

    Google Scholar 

  95. Jancy, S., & Jayakumar, C. (2019). Sequence statistical code based data compression algorithm for wireless sensor network. Wireless Personal Communications, 106(3), 971–985.

    Google Scholar 

  96. Whitby, A., Jøang, A., & Indulska, J. (2004). Filtering out unfair ratings in bayesian reputation systems. In The autonomous agents and multi-agent systems, New York.

  97. Aziz, A., Singh, K., Osamy, W., & Khedr, A. (2019). Optimizing compressive sensing matrix using chicken swarm optimizationalgorithm. IET Wireless Sensor Systems, 9, 306–312.

    Google Scholar 

  98. Aziz, A., & Singh, K. (2017). Adaptive compressive sensing based routing algorithm for internet of things and wireless sensor networks. In Communication and computing systems: Proceedings of the international conference on communication and computing systems (ICCCS 2016), Gurgaon, India, 9–11 September 2016 (p. 395). CRC Press.

  99. Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Comm., 11(6), 38–43.

    Google Scholar 

  100. Xiong, J., Zhao, J., & Chen, L. (2013). Efficient data gathering in wireless sensor networks based on matrix completion and compressive sensing. arXiv:1302.2244

  101. Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In 2007 international conference on wireless communications, networking and mobile computing (pp. 2684–2687). IEEE.

Download references

Acknowledgements

This work was carried out in Secure and Computing laboratory, SC&SS, JNU, New Delhi, India and sponsored by the project entitled “Development of Intelligent Device for Security Enhancement (iEYE)” with sanction order: DST/TDT/DDP12/2017-G.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Karan Singh.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, T., Singh, K. RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNs. Wireless Pers Commun 129, 953–991 (2023). https://doi.org/10.1007/s11277-022-10165-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10165-7

Keywords

Navigation