TY - JOUR
T1 - Comparative study of trust and reputation systems for wireless sensor networks
AU - Khalid, Osman
AU - Khan, Samee U.
AU - Madani, Sajjad A.
AU - Hayat, Khizar
AU - Khan, Majid I.
AU - Min-Allah, Nasro
AU - Kolodziej, Joanna
AU - Wang, Lizhe
AU - Zeadally, Sherali
AU - Chen, Dan
PY - 2013/6
Y1 - 2013/6
N2 - Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, because of unattended and insecure deployment, a sensor node may be physically captured by an adversary who may acquire the underlying secret keys, or a subset thereof, to access the critical data and/or other nodes present in the network. Moreover, a node may not properly operate because of insufficient resources or problems in the network link. In recent years, the basic ideas of trust and reputation have been applied to WSNs to monitor the changing behaviors of nodes in a network. Several trust and reputation monitoring (TRM) systems have been proposed, to integrate the concepts of trust in networks as an additional security measure, and various surveys are conducted on the aforementioned system. However, the existing surveys lack a comprehensive discussion on trust application specific to the WSNs. This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs. The survey discusses the components required to build a TRM and the trust computation phases explained with a study of various security attacks. The study investigates the recent advances in TRMs and includes a concise comparison of various TRMs. Finally, a discussion on open issues and challenges in the implementation of trust-based systems is also presented.
AB - Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, because of unattended and insecure deployment, a sensor node may be physically captured by an adversary who may acquire the underlying secret keys, or a subset thereof, to access the critical data and/or other nodes present in the network. Moreover, a node may not properly operate because of insufficient resources or problems in the network link. In recent years, the basic ideas of trust and reputation have been applied to WSNs to monitor the changing behaviors of nodes in a network. Several trust and reputation monitoring (TRM) systems have been proposed, to integrate the concepts of trust in networks as an additional security measure, and various surveys are conducted on the aforementioned system. However, the existing surveys lack a comprehensive discussion on trust application specific to the WSNs. This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs. The survey discusses the components required to build a TRM and the trust computation phases explained with a study of various security attacks. The study investigates the recent advances in TRMs and includes a concise comparison of various TRMs. Finally, a discussion on open issues and challenges in the implementation of trust-based systems is also presented.
KW - Repute
KW - Trust
KW - Trust and reputation systems
KW - WSN
UR - http://www.scopus.com/inward/record.url?scp=84876783129&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84876783129&partnerID=8YFLogxK
U2 - 10.1002/sec.597
DO - 10.1002/sec.597
M3 - Review article
AN - SCOPUS:84876783129
SN - 1939-0114
VL - 6
SP - 669
EP - 688
JO - Security and Communication Networks
JF - Security and Communication Networks
IS - 6
ER -