Abstract
The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the ability of a node as a continuum based on the current battery level and outage probability of the network. PSTRM also utilise an Elliptic-Curve Cryptography Diffie-Hellman (ECCDH) privacy-aware dissemination framework which encourages the sharing of accurate and credible indirect reputation information within network neighbourhoods. The following social constructs, viz., ability, benevolence and consistency were considered in the design of the proposed model. The detection rate of the proposed model was evaluated against that by Rathore et al., using MATLAB. PSTRM was found to have high detection rates than the proposal by Rathore et al.
Similar content being viewed by others
References
Nunoo-Mensah H, Boateng KO, Gadze JD (2017) Tamper-aware authentication framework for wireless sensor networks. IET Wireless Sensor Systems 7(3):73–81
Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688
Sen J (2010) A survey on wireless sensor network security. arXiv:1011.1529
Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security (final). DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1(1)
Ishmanov F, Kim SW, Nam SY (2015) A robust trust establishment scheme for wireless sensor networks. Sensors 15(3):7040–7061
Rani VU, Sundaram KS (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8:371–377
Gambetta D et al (2000) Can we trust trust. Trust: Making and Breaking Cooperative Relations 13:213–237
Krackhardt D, Nohria N, Eccles B (2003) The strength of strong ties. Netw Knowl Econ 82
Pai S, Roosta T, Wicker S, Sastry S (2007) Using social network theory towards development of wireless ad hoc network trust. In: 21st international conference on advanced information networking and applications workshops, 2007, AINAW’07, vol 1. IEEE, pp 443–450
Glynos D, Argyroudis P, Douligeris C (2012) Collaborative service evaluation with the TwoHop trust framework. Secur Commun Netw 5(6):594–613
He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans Inf Technol Biomed 16(4):623–632
Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692
Rathore H, Jha S (2013) Bio-inspired machine learning based wireless sensor network security. In: 2013 world congress on nature and biologically inspired computing (NaBIC). IEEE, pp 140–146
Zhang M, Xu C, Guan J, Zheng R, Wu Q, Zhang H (2014) A novel bio-inspired trusted routing protocol for mobile wireless sensor networks. TIIS 8(1):74–90
Song J, Li X, Hu J, Xu G, Feng Z (2015) Dynamic trust evaluation of wireless sensor networks based on multi-factor. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol 1. IEEE, pp 33–40
Sánchez Alcón JA, López L, Martínez J-F, Rubio Cifuentes G (2015) Trust and privacy solutions based on holistic service requirements. Sensors 16(1):16
Liu L, Chen L, Jia H (2016) Social Milieu oriented routing: a new dimension to enhance network security in WSNs. Sensors 16(2):247
Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451
Thangaraju P, Paul RM (2016) A novel survey regarding efficient distributed trust model in WSN. International Journal of Applied Engineering Research (IJAER):127–134
Rathore H, Badarla V, George KJ (2016) Sociopsychological trust model for wireless sensor networks. J Netw Comput Appl 62:75–87
Wang J, Jiang S, Fapojuwo AO (2017) A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors 17(6):1227
Chen Z, Tian L, Lin C (2017) Trust model of wireless sensor networks and its application in data fusion. Sensors 17(4):703
Sathish S, Ayyasamy A, Archana M (2018) An intelligent beta reputation and dynamic trust model for secure communication in wireless networks. In: Industry interactive innovations in science, engineering and technology. Springer, pp 395–402
She W, Liu Q, Tian Z, Chen J-S, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956
Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M et al (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240
Beheshtiasl A, Ghaffari A (2019) Secure and trust-aware routing scheme in wireless sensor networks. Wirel Pers Commun 107(4):1799–1814
Zawaideh F, Salamah M (2019) An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. Int J Commun Syst 32(3):e3878
Wu X, Huang J, Ling J, Shu L (2019) BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access 7:43679–43690
Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616
Zhao J, Huang J, Xiong N (2019) An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access 7:33859–33869
Nunoo-Mensah H, Boateng KO, Gadze JD (2017) The adoption of socio-and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int J Commun Syst 31:e3444
Rathore H, Badarla V, Shit S (2016) Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Trans Sen Netw 12(3):21:1–21:27. https://doi.org/10.1145/2903721
Zhang K, Xu K, Wei F (2018) A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks. Wireless Commun Mobile Comput 2018
Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394
Tajeddine A, Kayssi A, Chehab A, Elhajj I, Itani W (2015) CENTERA: a centralised trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 15(2):3299–3333
Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451
Tajeddine A, Kayssi A, Chehab A (2012) CENTER: a centralized trust-based efficient routing protocol for wireless sensor networks. In: 2012 tenth annual international conference on privacy, security and trust (PST). IEEE, pp 195–202
Liu G, Wang Y, Orgun MA, Lim E-P (2013) Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans Serv Comput 6(2):152–167
Liu G, Zhao L, Zheng K, Liu A, Xu J, Li Z, Bouguettaya A (2015) An efficient method to find the optimal social trust path in contextual social graphs. In: International conference on database systems for advanced applications. Springer, Cham, pp 399–417
Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568
Colquitt JA, Scott BA, LePine JA (2007) Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. American Psychological Association
Holtz BC (2013) Trust primacy: a model of the reciprocal relations between trust and perceived justice. J Manag 39(7):1891–1923
Klogo GS, Gadze JD, Diawuo H (2014) Radio coverage analysis of anchor nodes for the localization and monitoring of smart energy meters (SEM). Int J Comput Appl 85(13)
Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Nunoo-Mensah, H., Boateng, K.O. & Gadze, J.D. PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks. Peer-to-Peer Netw. Appl. 13, 1505–1525 (2020). https://doi.org/10.1007/s12083-020-00906-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00906-5