Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Full Text (PDF, 1238KB), PP.14-29

Views: 0 Downloads: 0

Author(s)

Audrey NANGUE 1,* Elie FUTE TAGNE 1,2 Emmanuel TONYE 3

1. University of Dschang, Dschang, Cameroon

2. University of Buea, Buea, Cameroon

3. University of Yaoundé 1, Yaoundé, Cameroon

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2020.06.02

Received: 24 Sep. 2020 / Revised: 23 Oct. 2020 / Accepted: 30 Oct. 2020 / Published: 8 Dec. 2020

Index Terms

Attack, penalty, reward, security, trust, trust management system

Abstract

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.

Cite This Paper

Audrey NANGUE, Elie FUTE TAGNE, Emmanuel TONYE, "Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network", International Journal of Computer Network and Information Security(IJCNIS), Vol.12, No.6, pp.14-29, 2020. DOI: 10.5815/ijcnis.2020.06.02

Reference

[1] Wang Yong, Attebury Garhan and Ramamurthy Byrav.. A Survey of Security Issues In Wireless Sensor Networks. IEEE Communications Surveys and Tutorials. 8:2 p. 2-23. , Second Quarter. 2006

[2] Lopez Javier, Roman Rodrigo, Agudo Isaac and Fernandez Gago Carmen. Trust management systems for wireless sensor networks: Best practices. Computer Communications. 33:9 p. 1086-1093. 2010

[3] Ishmanov Farruh, Kim Sung and Nam Seung Yeob. A Robust Trust Establishment Scheme for Wireless Sensor Networks. Sensors. 15:3 p. 7040-7061. 2015.

[4] Jadidoleslamy Hossein. TMS-HCW: A trust management system in hierarchical clustered wireless sensor networks. Security and Communication Networks. Security and Communication Networks. 8:18 p. 4110-4122. 2015.

[5] Sivagurunathan S., K. Prathapchandran and Thirumavalavan Aarthi. Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning. International Journal of Network Security & Its Applications. 8: p. 47-64. 2016.

[6] Basan Alexander, Barannik Elena and Makarevich Oleg. Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. P. 116-122. In Proceedings of the 9th International Conference on Security of Information and Networks (SIN '16). Association for Computing Machinery, New York, NY, USA.2016.

[7] Salehi Mohsen and Karimian Jamal. A Trust-based Security Approach in Hierarchical Wireless Sensor Networks. International Journal of Wireless and Microwave Technologies. 7: p. 58-67. 2017.

[8] Wang Jian, Jiang Shuai and Fapojuwo Abraham. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks. Sensors. 17: p. 1-19. 2017.

[9] He Daojing, Chen C., Chan Sammy, Bu Jiajun and Vasilakos Athanasios. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE transactions on information technology in biomedicine: a publication of the IEEE Engineering in Medicine and Biology Society. 16: P. 623-32. 2012.

[10] Sahoo Rashmi, Ray Sudhabindu, Sarkar Souvik and Bhoi Sourav. Guard against trust management vulnerabilities in Wireless Sensor Network. Arabian Journal for Science and Engineering. 43: p.1-23 2018.

[11] Alzaid Hani, Alfaraj Manal, Ries Sebastian, Jøsang Audun, Albabtain Muneera and Abuhaimed, Alhanof.. Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. IFIP Advances in Information and Communication Technology.401: P. 66-82. 2013.

[12] Shaikh Riaz, Jameel Hassan, d'Auriol Brian, Lee Heejo, Lee Sungyoung and Song Young Jae. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst.. 20(11): p.1698-1712. 2009.

[13] Ishmanov Farruh, Kim Sung and Nam Seung Yeob. A Secure Trust Establishment Scheme for Wireless Sensor Networks. Sensors. 14: P. 1877-97. 2014.

[14] Ganeriwal Saurabh, Balzano Laura a,d Srivastava Mani. Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw. 4:3. 2003

[15] Khan Tayyab, Singh Karan, Son Le, Abdel-Basset Mohamed, Long Hoang, Singh Satya and Manjul Manisha. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks. IEEE Access. PP. 1-20. 2019.

[16] P. Raghu Vamsi and Krishna Kant. Self-Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks. International Journal of Intelligent Systems and Applications (IJISA).7:3 pp.21-28, 2015.

[17] Randhawa Sukhchandan, Jain Sushma and Ritu. Trust Models in Cloud Computing: A Review. International Journal of Wireless and Microwave Technologies. 7. 2017.

[18] Matthew Kiran and Md Abdul. An Effective Way of Evaluating Trust in Inter-cloud Computing. International Journal of Computer Network and Information Security. 9: pp 36-42. 2017.