Trust Modeling in Wireless Sensor Networks: State of the Art

Mohammed Mahdi AlQahatani, Mostafa G. M. Mostafa


Wireless sensor networks (WSNs) is the backbone of the new generation of internet of things (IoT). WSNs are growing rapidly and security threats are increasingly growing as well. Trust computing plays a crucial role in WSN security modeling. In WSN node trust is important to keep the network safe and operational. This paper presents the state-of-the-art techniques in WSN Trust modeling. Comparison and analysis of most recent solutions were conducted. Direction and trends of current and future research approaches are also presented.

Full Text:



Döbelt, S., M. Busch, and C. Hochleitner, Defining, Understanding, Explaining TRUST within the uTRUSTit Project. CURE, Vienna, Austria, Tech. Rep, 2012.

Shahzad, F., M. Pasha, and A. Ahmad, A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures. arXiv preprint arXiv:1702.07136, 2017.

Akyildiz, I.F., et al., Wireless sensor networks: a survey. Computer networks, 2002. 38(4): p. 393-422.

Fahmy, H.M.A., Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis. 2016: Springer.

Sai, V.P. and V.R. Shyam, Vampire Attacks: Draining Life From Wireless Ad-Hoc Sensor Networks. IJRCCT, 2015. 4(8): p. 586-593.

Dubey, A., V. Jain, and A. Kumar, A survey in energy drain attacks and their countermeasures in wireless sensor networks. Int. J. Eng. Res. Technol, 2014. 3(2): p. 1206-1210.

Wang, W., Y. Lu, and B.K. Bhargava. On vulnerability and protection of ad hoc on-demand distance vector protocol. in Telecommunications, 2003. ICT 2003. 10th International Conference on. 2003. IEEE.

Gill, R.K. and M. Sachdeva, Detection of Hello Flood Attack on LEACH in Wireless Sensor Networks, in Next-Generation Networks. 2018, Springer. p. 377-387.

Ramos, A., B. Aquino, and J. Rodrigues. Quantifying node security in wireless sensor networks under worm attacks. in Proc. Brazil. Symp. Comput. Netw. 2017.

Sinha, P., et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. in Signal Processing and Communication (ICSPC), 2017 International Conference on. 2017. IEEE.

Bhushan, B. and G. Sahoo, Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks. Wireless Personal Communications, 2018. 98(2): p. 2037-2077.

Wang, Q., et al., Mitigating Jamming Attack: A Game Theoretic Perspective. IEEE Transactions on Vehicular Technology, 2018.

Reindl, P., K. Nygard, and X. Du. Defending malicious collision attacks in wireless sensor networks. in Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on. 2010. IEEE.

Jo, M., et al., A survey: energy exhausting attacks in MAC protocols in WBANs. Telecommunication Systems, 2015. 58(2): p. 153-164.

Ramaswamy, S., et al. Prevention of cooperative black hole attack in wireless ad hoc networks. in International conference on wireless networks. 2003.

Zhang, Z., et al., M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks. Cluster Computing, 2018: p. 1-9.

Jahandoust, G. and F. Ghassemi, An adaptive sinkhole aware algorithm in wireless sensor networks. Ad Hoc Networks, 2017. 59: p. 24-34.

Raymond, D.R. and S.F. Midkiff, Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 2008. 7(1).

Chawla, P. and M. Sachdeva, Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks, in Next-Generation Networks. 2018, Springer. p. 389-398.

Zhang, Y. and M. Minier, Selective forwarding attacks against data and ack flows in network coding and countermeasures. Journal of Computer Networks and Communications, 2012. 2012.

Malik, R., H. Sehrawat, and Y. Singh, Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks. International Journal, 2017. 8(5).

Castell, W.D., et al., Wireless communication system congestion reduction system and method. 2014, Google Patents.

Illiano, V.P., L. Munoz-González, and E.C. Lupu, Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks. IEEE Transactions on Dependable and Secure Computing, 2017. 14(3): p. 279-293.

Naik, A.S. and R. Murugan, Security Attacks and Energy Efficiency in Wireless Sensor Networks: A Survey. International Journal of Applied Engineering Research, 2018. 13(1): p. 107-112.

Newsome, J., et al. The sybil attack in sensor networks: analysis & defenses. in Proceedings of the 3rd international symposium on Information processing in sensor networks. 2004. ACM.

Mohammed, D., M. Omar, and V. Nguyen, Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks. Journal of Research in Business, Economics and Management, 2018. 10(2): p. 1860-1864.

Hu, Y.-C., A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.

Diaz, A. and P. Sanchez, Simulation of attacks for security in wireless sensor network. Sensors, 2016. 16(11): p. 1932.

Zhang, W., et al., A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. The Journal of Supercomputing, 2018. 74(4): p. 1779-1801.

Ganeriwal, S., L.K. Balzano, and M.B. Srivastava, Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 2008. 4(3): p. 15.

Yang, Y., et al. RepTrap: a novel attack on feedback-based reputation systems. in Proceedings of the 4th international conference on Security and privacy in communication netowrks. 2008. ACM.

Kamvar, S.D., M.T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. in Proceedings of the 12th international conference on World Wide Web. 2003. ACM.

Feng, R., et al., A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory. Sensors, 2011. 11(2): p. 1345-1360.

Yao, Z., D. Kim, and Y. Doh. PLUS: Parameterized and localized trust management scheme for sensor networks security. in Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on. 2006. IEEE.

Safa, H., A novel localization algorithm for large scale wireless sensor networks. Computer communications, 2014. 45: p. 32- 46.

Chen, H., et al. Agent-based trust model in wireless sensor networks. in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on. 2007. IEEE.

Chen, H., Task-based trust management for wireless sensor networks. International Journal of Security and its applications, 2009. 3(2): p. 21-26.

Ye, F., et al., Statistical en-route filtering of injected false data in sensor networks, ǁ in IEEE INFOCOM. 2004, March.

Hur, J., et al. Trust evaluation model for wireless sensor networks. in Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on. 2005. IEEE.

Sastry, N., U. Shankar, and D. Wagner. Secure verification of location claims. in Proceedings of the 2nd ACM workshop on Wireless security. 2003. ACM.

Han, G., et al., Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 2014. 80(3): p. 602-617.

Gomez, L., A. Laube, and A. Sorniotti. Trustworthiness assessment of wireless sensor data for business applications. in Advanced Information Networking and Applications, 2009. AINA'09. International Conference on. 2009. IEEE.

Haron, N., et al. Data trustworthiness in Internet of Things: A taxonomy and future directions. in Big Data and Analytics (ICBDA), 2017 IEEE Conference on. 2017. IEEE.

Hui-hui, D., et al. A wireless sensor networks based on multi-angle trust of node. in Information Technology and Applications, 2009. IFITA'09. International Forum on. 2009. IEEE.

Kazmi, F., et al. Evaluation of trust management approaches in wireless sensor networks. in Applied Sciences and Technology (IBCAST), 2018 15th International Bhurban Conference on. 2018. IEEE.

Rathore, H., V. Badarla, and K. George, Sociopsychological trust model for wireless sensor networks. Journal of Network and Computer Applications, 2016. 62: p. 75-87.

Rathore, H., V. Badarla, and S. Shit, Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Transactions on sensor networks (TOSN), 2016. 12(3): p. 21.

Deng, H., et al. Selective forwarding attack detection using watermark in WSNs. in Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on. 2009. IEEE.

Yan, X., et al., Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks. Enterprise information systems, 2017. 11(2): p. 223-249.

Vamsi, P.R. and K. Kant, Self adaptive trust model for secure geographic routing in wireless sensor networks. International Journal of Intelligent Systems and Applications, 2015. 7(3): p. 21.

Deng, H., et al. Building a trust-aware dynamic routing solution for wireless sensor networks. in GLOBECOM Workshops (GC Wkshps), 2010 IEEE. 2010. IEEE.

Gong, P., T.M. Chen, and Q. Xu, ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks. Journal of Sensors, 2015. 2015.

Poolsappasit, N. and S. Madria. A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network. in Parallel Processing (ICPP), 2011 International Conference on. 2011. IEEE.

Rezvani, M., et al., Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 2015. 12(1): p. 98-110.

Gilbert, E.P.K., et al., Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 2018.

Venayagamoorthy, G.K.K., A successful interdisciplinary course on coputational intelligence. IEEE Computational Intelligence Magazine, 2009. 4(1): p. 14-23.

Andries, P.E., Computational intelligence: an introduction. 2007, John Wiley & Sons, West Sussex, England.

Yasin, A. and K. Sabaneh, Enhancing Wireless Sensor Network Security using Artificial Neural Network based Trust Model. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016. 7(9): p. 222- 228.

McDermott, C.D. and A. Petrovski, Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. 2017.

Kamhoua, C.A., N. Pissinou, and K. Makki. Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy. in Communications (ICC), 2011 IEEE International Conference on. 2011. IEEE.

Li, Y., et al., Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks. International Journal of Distributed Sensor Networks, 2015. 11(2): p. 818903.

Shen, S., et al., Trust dynamics in WSNs: an evolutionary game-theoretic approach. Journal of Sensors, 2016. 2016.

Cao, B., et al., 3D Multi-Objective Deployment of an Industrial Wireless Sensor Network for Maritime Applications Utilizing a Distributed Parallel Algorithm. IEEE Transactions on Industrial Informatics, 2018.

Dorigo, M., M. Birattari, and T. Stutzle, Ant colony optimization. IEEE computational intelligence magazine, 2006. 1(4): p. 28-39.

Marzi, H. and M. Li, An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Computer Science, 2013. 19: p. 1159-1166.

Xiong, L. and L. Liu, Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE transactions on Knowledge and Data Engineering, 2004. 16(7): p. 843-857.

Rao, P.S., P.K. Jana, and H. Banka, A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor networks. Wireless Networks, 2017. 23(7): p. 2005-2020.

Rathore, H., et al. Novel approach for security in wireless sensor network using bio-inspirations. in Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference on. 2014. IEEE.

Zhang, X., et al., An improved immune system-inspired routing recovery scheme for energy harvesting wireless sensor networks. Soft Computing, 2017. 21(20): p. 5893-5904.

Mohapatra, S. and P.M. Khilar. Artificial immune system based fault diagnosis in large wireless sensor network topology. in Region 10 Conference, TENCON 2017- 2017 IEEE. 2017. IEEE.

Chen, D., et al., TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Computer Science and Information Systems, 2011. 8(4): p. 1207-1228.

Gómez Mármol, F., J.G. Marín-Blázquez, and G. Martínez Pérez, LFTM, linguistic fuzzy trust mechanism for distributed networks. Concurrency and Computation: Practice and Experience, 2012. 24(17): p. 2007-2027.

Kim, T.K. and H.S. Seo, A trust model using fuzzy logic in wireless sensor network. World academy of science, engineering and technology, 2008. 42(6): p. 63-66.

Raje, R.A. and A.V. Sakhare. Routing in wireless sensor network using fuzzy based trust model. in Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on. 2014. IEEE.

Saleem, K., et al. Biological inspired self-optimized routing algorithm for wireless sensor networks. in Communications (MICC), 2009 IEEE 9th Malaysia International Conference on. 2009. IEEE.

Saleem, K., N. Fisal, and J. Al-Muhtadi, Empirical studies of bio-inspired self-organized secure autonomous routing protocol. IEEE Sensors Journal, 2014. 14(7): p. 2232-2239.

Veena, K. and B.V. Kumar. Dynamic clustering for Wireless Sensor Networks: a neuro-fuzzy technique approach. in Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on. 2010. IEEE.

Singh, K., D. Sharma, and S. Aggarwal, A Real Time Patient Monitoring System based on Artificial Neural Fuzzy Inference System (ANFIS). International Journal of Computer Applications, 2016. 146(15).

Neamatollahi, P., et al., Hierarchical Clustering-task Scheduling Policy in Cluster-based Wireless Sensor Networks. IEEE Transactions on Industrial Informatics, 2017.

Zhou, Y., T. Huang, and W. Wang. A trust establishment scheme for cluster-based sensor networks. in Wireless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th International Conference on. 2009. IEEE.

Shaikh, R.A., et al. Trust management problem in distributed wireless sensor networks. in Embedded and real-time computing systems and applications, 2006. proceedings. 12th ieee international conference on. 2006. IEEE.

Shaikh, R.A., et al., Group-based trust management scheme for clustered wireless sensor networks. IEEE transactions on parallel and distributed systems, 2009. 20(11): p. 1698-1712.

Che, S., et al., A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Security and Communication Networks, 2015. 8(2): p. 168-175.


  • There are currently no refbacks.