An Intelligent Beta Reputation and Dynamic Trust Model for Secure Communication in Wireless Networks

  • S. SathishEmail author
  • A. Ayyasamy
  • M. Archana
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 11)


Networking technology is playing a major role in daily life for communicating each other. Security is the most important issue in wireless networks. Recently, trust and reputation mechanisms are used for providing security through monitoring the behaviour. However, the existing works lack in providing reliable security to wireless networks. In this paper, we propose an intelligent beta reputation and dynamic trust model (IBRDT) for providing security in wireless networks. This model is the combination of dynamic trust and beta reputation trust for secure routing in wireless networks.


Wireless networks IBRDT Secure routing Beta reputation Dynamic trust model 


  1. 1.
    Zhu, C., et al.: An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forensics Secur. 10(1), 118–131 (2015)CrossRefGoogle Scholar
  2. 2.
    Das, A., Islam, M.M.: Secured trust: a dynamic trust computation model for secured communication in multi agent systems. IEEE Trans. Dependable Secure Comput. 9(2), 261–274 (2012)CrossRefGoogle Scholar
  3. 3.
    Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(3) (2008)Google Scholar
  4. 4.
    Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of 15th Bled Electronic Commerce Conference, 2002, pp. 324–337Google Scholar
  5. 5.
    Bao, F., Chen, I.-R., Chang, M., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manage. 9(2), 169–183 (2002)CrossRefGoogle Scholar
  6. 6.
    Geetha, G., Jayakumar, C.: Implementation of trust and reputation management for free-roaming mobile agent security. IEEE Syst. J. 9(2), 556–566 (2005)CrossRefGoogle Scholar
  7. 7.
    Chae, Y., Dipippo, L.C., Sun, Y.L.: Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1178–1191 (2015)CrossRefGoogle Scholar
  8. 8.
    Mousavifar, S.A., Leung, C.: Energy efficient collaborative spectrum sensing based on trust management in cognitive radio networks. IEEE Trans. Wireless Commun. 14(4), 1927–1939 (2015)CrossRefGoogle Scholar
  9. 9.
    Kraounakis, S., Demetropoulos, I.N., Michalas, A., Obaidat, S.M., Sarigiannidis, P.G., Louta, M.D.: A robust reputation-based computational model for trust establishment in pervasive systems. IEEE Syst. J. 9(3), 878–891 (2015)CrossRefGoogle Scholar
  10. 10.
    Muneeswari, S.J., Ganapathy, S., Kannan, A.: Intelligent data gathering and energy efficient routing algorithm for mobile wireless sensor networks. Asian J. Inf. Technol. 15(5), 921–927 (2016)Google Scholar
  11. 11.
    Logambigai, R., Kannan, A.: Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Netw. 22(3), 945–957 (2016)CrossRefGoogle Scholar
  12. 12.
    Al-Jarrah, O.Y., Alhussein, O., Yoo, P.D., Muhaidat, S., Taha, K., Kim, K.: Data randomization and cluster-based partitioning for Botnet intrusion detection. IEEE Trans. Cybern. 46(8), 1796–1805 (2016)CrossRefGoogle Scholar
  13. 13.
    Rajeshwari, A.R., Kulothungan, K., Ganapathy, S., Kannan, A.: Malicious nodes detection in MANET using back-off clustering approach. Circuits Syst. 7, 2070–2079 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Faculty of Engineering and Technology, Department of Computer Science and EngineeringAnnamalai UniversityAnnamalai NagarIndia

Personalised recommendations