Advertisement

Wireless Personal Communications

, Volume 97, Issue 3, pp 3705–3723 | Cite as

Self-Recommendation Mechanism in Trust Calculation Among Nodes in WSN

  • Xiang GuEmail author
  • Jin Wang
  • Jianlin Qiu
  • Zhengzheng Jiang
Article
  • 149 Downloads

Abstract

This paper proposes a node self-recommendation mechanism which is effective in trust calculation model in wireless sensor networks (WSNs). The mechanism has little practical sense to cable and wireless network among which nodes’ resources, especially energy, are almost unlimited; furthermore it may bring some security risk to networks on the contrary. But as to WSNs where nodes’ resources are strictly limited, a node can express its intension of participating communication to its neighbors by using the mechanism according to its current running state and predefined strategies. This mechanism is useful to save nodes’ energy, balance network load and prolong network lifetime ultimately. The paper focuses on self-recommendation value expression, calculation and synthesis method. Application method of the mechanism is also discussed. Simulation results show that using trust calculation model cooperatively with self-recommendation mechanism can protect low energy nodes effectively and balance energy consumption among adjacent nodes without weakening malicious node identification function of the trust model.

Keywords

Wireless sensor network Trust model Self-recommendation mechanism Routing protocol 

Notes

Acknowledgements

This work is supported by Jiangsu Overseas Research & Training Program for University Prominent Young &Middle-aged Teachers and Presidents Project, and in part by the Natural Science Foundation of the Jiangsu Higher Education Institutions (15KJB520029, 16KJB520038) and the Science Foundation of Nantong of Jiangsu Grants (BK2014064). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

References

  1. 1.
    Freudenthal, E., Pesin, T., Port, L., Keenan, K., & Karamcheti, V. (2002). dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the. 22nd international conference on distributed computing systems (pp. 411–420). IEEE.Google Scholar
  2. 2.
    Ryutov, T., & Neuman, C. (2007). Trust based approach for improving data reliability in industrial sensor networks. Trust Management (pp. 349–365). Berlin: Springer.Google Scholar
  3. 3.
    Lu, Y., Lin, K., & Li, K. (2012) Trust evaluation model against insider attack in wireless sensor networks. In International conference on cloud and green computing (pp. 319–326). IEEE.Google Scholar
  4. 4.
    Ruohomaa, S., & Kutvonen, L. (2005). Trust management survey. Trust management (pp. 77–92). Berlin: Springer.Google Scholar
  5. 5.
    Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.CrossRefGoogle Scholar
  6. 6.
    Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communication, 30(11), 2411–2427.Google Scholar
  7. 7.
    Ganeriwal, S., Srivastava. M. B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 66–77).Google Scholar
  8. 8.
    Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., & Caredei, M. (2008). Reputation and trust based system for ad hoc and sensor networks. In A. Boukerche (Ed.), Algorithms and protocols for wireless ad-hoc and sensor netowrks. New Jersey: Wiley.Google Scholar
  9. 9.
    Chen, H., Wu, H., Zhou, X., & Gao, C. (2007). Agent-based trust model in wireless sensor networks. In 8th ACIS international conference software engineering, artificial intelligence parallel/distribute computing (pp. 119–124).Google Scholar
  10. 10.
    Liu, S., Pang, L., Pei, Q., Ma, H., & Peng, Q. (2009) Distributed event-triggered trust management for wirless sensor networks. In 5th international conference on information assurance and security.Google Scholar
  11. 11.
    Qiming, H., & Haiyan, N. (2009). Reputation computing for wireless sensor networks based on dirichlet distribution. Chinese Journal of Sensors and Actuators, 22(4), 526–529.Google Scholar
  12. 12.
    Wen, T., & Zhong, C. (2003). Research of subjective trust management model based on the fuzzy set theory. Journal of Software, 14(8), 1401–1407.zbMATHGoogle Scholar
  13. 13.
    Tang Wen, H., & Jianbin, C. Z. (2005). Research on a fuzzy logic-based subjective trust management model. Journal of Computer Research and Development, 42(10), 1654–1659.CrossRefGoogle Scholar
  14. 14.
    Cheng, J., Wang, H., Bao, C., & Bao, H. (2012). Trust evaluation model based on fuzzy logic in wireless sensor networks. Measurement and Control Technology, 31(4), 13–16.Google Scholar
  15. 15.
    Jian, C., Feng Renjian, X., & Xianfeng, W. J. (2009). Trust evaluation model based on d-s evidence theory in wireless sensor network. Chinese Journal of Sensors and Actuators, 22(12), 1802–1807.Google Scholar
  16. 16.
    Michiardi, P., & Molva, R. (2002) CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, 9.Google Scholar
  17. 17.
    Yau, P. W., & Mitchell, C. J. (2003) Reputation methods for routing security for mobile ad hoc networks. In Proceedings of joint IST workshop on mobile fitire and symposiim on trends in communications (pp. 130–137).Google Scholar
  18. 18.
    Bin, Ma., & Xianzhong, X. (2010). Cloud trust for wireless sensor networks. Computer Science, 37(3), 128–132.Google Scholar
  19. 19.
    Zhikui, C., & Bingjie, Z. (2010). Trust evaluation for wireless sensor networks based on trust-cloud. Journal of Computer Applications, 30(12), 3346–3348.Google Scholar
  20. 20.
    Vamsi, P. R., & Kant, K. (2014). Performance analysis of trust based geographic routing protocols for wireless sensor networks. In International conference on parallel, distributed and grid computing (PDGC) (pp. 318–323). IEEE.Google Scholar
  21. 21.
    Ramalingam, L., & Audithan, S. (2014). Trust based cluster head selection algorithm for wireless sensor network. In International conference on current trends in engineering and technology (ICCTET) (pp. 453–457). IEEE.Google Scholar
  22. 22.
    Alkalbani, A. S., Tap, A. M., & Mantoro, T. (2013). Energy consumption evaluation in trust and reputation models for wireless sensor networks. In International conference on information and communication technology for the Muslim World (ICT4 M) (pp. 1–6). IEEE.Google Scholar
  23. 23.
    Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., & Teo, J. C. M. (2015). Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Transactions on Information Forensics and Security, 10(3), 613–625.CrossRefGoogle Scholar
  24. 24.
    Tianhua, W., & Na, W. (2014). A trust model for wireless sensor networks based on multi-factors. In International conference on computer science & education (ICCSE) (pp. 407–410). IEEE.Google Scholar
  25. 25.
    Xiang, G., Jianlin, Q., Zhan, G., & Jin, W. (2012). A kind of trust calculation model among nodes in wireless sensor networks. ICIC Express Letters, 6(7), 1821–1826.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyNantong UniversityNantongChina

Personalised recommendations