Skip to main content
Log in

PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the ability of a node as a continuum based on the current battery level and outage probability of the network. PSTRM also utilise an Elliptic-Curve Cryptography Diffie-Hellman (ECCDH) privacy-aware dissemination framework which encourages the sharing of accurate and credible indirect reputation information within network neighbourhoods. The following social constructs, viz., ability, benevolence and consistency were considered in the design of the proposed model. The detection rate of the proposed model was evaluated against that by Rathore et al., using MATLAB. PSTRM was found to have high detection rates than the proposal by Rathore et al.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Nunoo-Mensah H, Boateng KO, Gadze JD (2017) Tamper-aware authentication framework for wireless sensor networks. IET Wireless Sensor Systems 7(3):73–81

    Article  Google Scholar 

  2. Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688

    Article  Google Scholar 

  3. Sen J (2010) A survey on wireless sensor network security. arXiv:1011.1529

  4. Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security (final). DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1(1)

  5. Ishmanov F, Kim SW, Nam SY (2015) A robust trust establishment scheme for wireless sensor networks. Sensors 15(3):7040–7061

    Article  Google Scholar 

  6. Rani VU, Sundaram KS (2014) Review of trust models in wireless sensor networks. Int J Comput Inf Syst Control Eng 8:371–377

    Google Scholar 

  7. Gambetta D et al (2000) Can we trust trust. Trust: Making and Breaking Cooperative Relations 13:213–237

    Google Scholar 

  8. Krackhardt D, Nohria N, Eccles B (2003) The strength of strong ties. Netw Knowl Econ 82

  9. Pai S, Roosta T, Wicker S, Sastry S (2007) Using social network theory towards development of wireless ad hoc network trust. In: 21st international conference on advanced information networking and applications workshops, 2007, AINAW’07, vol 1. IEEE, pp 443–450

  10. Glynos D, Argyroudis P, Douligeris C (2012) Collaborative service evaluation with the TwoHop trust framework. Secur Commun Netw 5(6):594–613

    Article  Google Scholar 

  11. He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans Inf Technol Biomed 16(4):623–632

    Article  Google Scholar 

  12. Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692

    Article  Google Scholar 

  13. Rathore H, Jha S (2013) Bio-inspired machine learning based wireless sensor network security. In: 2013 world congress on nature and biologically inspired computing (NaBIC). IEEE, pp 140–146

  14. Zhang M, Xu C, Guan J, Zheng R, Wu Q, Zhang H (2014) A novel bio-inspired trusted routing protocol for mobile wireless sensor networks. TIIS 8(1):74–90

    Article  Google Scholar 

  15. Song J, Li X, Hu J, Xu G, Feng Z (2015) Dynamic trust evaluation of wireless sensor networks based on multi-factor. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol 1. IEEE, pp 33–40

  16. Sánchez Alcón JA, López L, Martínez J-F, Rubio Cifuentes G (2015) Trust and privacy solutions based on holistic service requirements. Sensors 16(1):16

    Article  Google Scholar 

  17. Liu L, Chen L, Jia H (2016) Social Milieu oriented routing: a new dimension to enhance network security in WSNs. Sensors 16(2):247

    Article  Google Scholar 

  18. Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451

    Article  MathSciNet  Google Scholar 

  19. Thangaraju P, Paul RM (2016) A novel survey regarding efficient distributed trust model in WSN. International Journal of Applied Engineering Research (IJAER):127–134

  20. Rathore H, Badarla V, George KJ (2016) Sociopsychological trust model for wireless sensor networks. J Netw Comput Appl 62:75–87

    Article  Google Scholar 

  21. Wang J, Jiang S, Fapojuwo AO (2017) A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors 17(6):1227

    Article  Google Scholar 

  22. Chen Z, Tian L, Lin C (2017) Trust model of wireless sensor networks and its application in data fusion. Sensors 17(4):703

    Article  Google Scholar 

  23. Sathish S, Ayyasamy A, Archana M (2018) An intelligent beta reputation and dynamic trust model for secure communication in wireless networks. In: Industry interactive innovations in science, engineering and technology. Springer, pp 395–402

  24. She W, Liu Q, Tian Z, Chen J-S, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956

    Article  Google Scholar 

  25. Khan T, Singh K, Abdel-Basset M, Long HV, Singh SP, Manjul M et al (2019) A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7:58221–58240

    Article  Google Scholar 

  26. Beheshtiasl A, Ghaffari A (2019) Secure and trust-aware routing scheme in wireless sensor networks. Wirel Pers Commun 107(4):1799–1814

    Article  Google Scholar 

  27. Zawaideh F, Salamah M (2019) An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. Int J Commun Syst 32(3):e3878

    Article  Google Scholar 

  28. Wu X, Huang J, Ling J, Shu L (2019) BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access 7:43679–43690

    Article  Google Scholar 

  29. Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616

    Article  Google Scholar 

  30. Zhao J, Huang J, Xiong N (2019) An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access 7:33859–33869

    Article  Google Scholar 

  31. Nunoo-Mensah H, Boateng KO, Gadze JD (2017) The adoption of socio-and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int J Commun Syst 31:e3444

    Article  Google Scholar 

  32. Rathore H, Badarla V, Shit S (2016) Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Trans Sen Netw 12(3):21:1–21:27. https://doi.org/10.1145/2903721

    Article  Google Scholar 

  33. Zhang K, Xu K, Wei F (2018) A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks. Wireless Commun Mobile Comput 2018

  34. Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394

    Article  Google Scholar 

  35. Tajeddine A, Kayssi A, Chehab A, Elhajj I, Itani W (2015) CENTERA: a centralised trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 15(2):3299–3333

    Article  Google Scholar 

  36. Liu A, Liu X, Long J (2016) A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16(4):451

    Article  MathSciNet  Google Scholar 

  37. Tajeddine A, Kayssi A, Chehab A (2012) CENTER: a centralized trust-based efficient routing protocol for wireless sensor networks. In: 2012 tenth annual international conference on privacy, security and trust (PST). IEEE, pp 195–202

  38. Liu G, Wang Y, Orgun MA, Lim E-P (2013) Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans Serv Comput 6(2):152–167

    Article  Google Scholar 

  39. Liu G, Zhao L, Zheng K, Liu A, Xu J, Li Z, Bouguettaya A (2015) An efficient method to find the optimal social trust path in contextual social graphs. In: International conference on database systems for advanced applications. Springer, Cham, pp 399–417

  40. Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568

    Article  Google Scholar 

  41. Colquitt JA, Scott BA, LePine JA (2007) Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. American Psychological Association

  42. Holtz BC (2013) Trust primacy: a model of the reciprocal relations between trust and perceived justice. J Manag 39(7):1891–1923

    Google Scholar 

  43. Klogo GS, Gadze JD, Diawuo H (2014) Radio coverage analysis of anchor nodes for the localization and monitoring of smart energy meters (SEM). Int J Comput Appl 85(13)

  44. Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Henry Nunoo-Mensah.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nunoo-Mensah, H., Boateng, K.O. & Gadze, J.D. PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks. Peer-to-Peer Netw. Appl. 13, 1505–1525 (2020). https://doi.org/10.1007/s12083-020-00906-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00906-5

Keywords

Navigation