WSN  Vol.6 No.8 , August 2014
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN
ABSTRACT
In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically.

Cite this paper
Babu, S. , Raha, A. and Naskar, M. (2014) Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN. Wireless Sensor Network, 6, 157-172. doi: 10.4236/wsn.2014.68016.
References
[1]   Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks, 38, 393-422.
http://dx.doi.org/10.1016/S1389-1286(01)00302-4

[2]   Culler, D., Estrin, D. and Srivastava M. (2004) Overview of Sensor Networks. IEEE Computer Society, August 2004.

[3]   Chintalapudi, K., Fu, T., Paek, J., Kothari, N., Rangwala, S., Caffrey, J., Govindan, R., Johnson, E. and Masri, S. (2006) Monotoring Civil Structures with a Wireless Sensor Network. IEEE Internet Computing, 10, 26-34.
http://dx.doi.org/10.1109/MIC.2006.38

[4]   Mainwaring, et al. (2002) Wireless Sensor Networks for Habitat Monotoring. International Workshop on Wireless Sensor Networks and Applications (ACM).
http://dx.doi.org/10.1145/570738.570751

[5]   Karlof, C. and Wagner, D. (2003) Secure Routing in Sensor Networks: Attacks and Countermeasures. First IEEE International Workshop on Sensor Network Protocols and Applications.

[6]   Perrig, A., Zewczyk, R., Wen, V., Culler, D. and Tygar, D. (2002) SPINS: Secirity Protocols for Sensor Networks. Wireless Networks, 8, 521-534.
http://dx.doi.org/10.1023/A:1016598314198

[7]   Shaikh, R.A., Lee, S., Khan, M.A.U. and Song, Y.J. (2006) LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. Proceedings of 11th IFIP International Conference on Personal Wireless Communication (PWC’06), Spain, September 2006.

[8]   Zhang, Y., Liu, W., Lou, W. and Fang, Y. (2006) Location-Based Compromise Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, 24, 247-260.
http://dx.doi.org/10.1109/JSAC.2005.861382

[9]   Karlof, C., Sastry, N. and Wagner, D. (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, 162-175.
http://dx.doi.org/10.1145/1031495.1031515

[10]   Zahariadis, T., Leigou, H.C., Trakadas, P. and Voliotis, S. (2010) Mobile Networks: Trust Management in Wireless Sensor Networks. European Transactions on Telecommunications, 21, 386-395.

[11]   Sun, Y., Han, Z. and Liu, K.J.R. (2008) Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine, 46, 112-119.

[12]   Saraogi, M. (2005) Security in Wireless Sensor Networks. Department of Computer Science, University of Tennessee, Knoxville.

[13]   Lopez, J., Roman, R., Agudo, I. and Fernandez-Gago, C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33, 1086-1093.
http://dx.doi.org/10.1016/j.comcom.2010.02.006

[14]   Momani, M. (2008) Bayesian Methods for Modeling and Management of Trust in Wireless Sensor Networks. Ph.D. Thesis, University of Technology, Sydney.

[15]   Babu, S.S., Raha, A. and Naskar, M.K. (2011) A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP). Wireless Sensor Network, 3, 125-134.
http://dx.doi.org/10.4236/wsn.2011.34015

[16]   Trakadas, P., Maniatis, S., Zahariadis, T., Leigou, H.C. and Voliotis, S. (2009) A Novel Flexible Trust Management System for Heterogeneous Sensor Networks. International Symposium on Autonomous Decentralized Systems, ISADS 2009, Athens, 23-25 March 2009, 369-374.

[17]   Liu, K., Abu-Ghazaleh, N. and Kang, K.D. (2007) Location Verification and Trust Management for Resilient Geographic Routing. Journal of Parallel and Distributed Computing, 67, 215-228.
http://dx.doi.org/10.1016/j.jpdc.2006.08.001

[18]   Kim, T.K. and Seo, H.S. (2008) A Trust Model Using Fuzzy Logic in Wireless Sensor Network. Proceedings of World Academy of Science, Engineering and Technology, 44, 69.

 
 
Top