A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
Adnan AHMED, Kamalrulnizam ABU BAKAR, Muhammad Ibrahim CHANNA, Khalid HASEEB, Abdul Waheed KHAN
A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable appreciation and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challenging issue due to the nature of environments in which nodes operate. Nodes’ physical capture, malicious or selfish behavior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recognition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the stateof-the-art into two groups namely node-centric trust models and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assignments, we evaluate the efficacy of the existing schemes. Finally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation management.
trust / reputation / wireless sensor network / mobile ad-hoc networks / routing / node misbehavior
[1] |
Tsetsos V, Alyfantis G, Hasiotis T, Sekkas O, Hadjiefthymiades S. Towards commercial wireless sensor networks: business and technology architecture. Ad Hoc & Sensor Wireless Networks, 2006, 2(1): 59-80
|
[2] |
Padmavathi G, Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1): 1-9
|
[3] |
Jain A, Kant K, Tripathy M. Security solutions for wireless sensor networks. In: Proceedings of the 2nd IEEE International Conference on Advanced Computing & Communication Technologies (ACCT). 2012, 430-433
|
[4] |
Zhou Z, Yow K C. Geographic ad hoc routing security: attacks and countermeasures. Ad Hoc & Sensor Wireless Networks, 2005, 1(3): 235-253
|
[5] |
Becher A, Benenson Z, Dornseif M. Tampering with motes: realworld physical attacks on wireless sensor networks. Technical Report. Springer Berlin Heidelberg, 2006
|
[6] |
He D, Gao Y, Chan S, Chen C, Bu J. An enhanced Two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2010, 10(4): 361-371
|
[7] |
Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M. Reputation and trust-based systems for ad hoc and sensor networks. In: Boukerche A, ed. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks. Ottawa: Wiley, 2008, 375-403
CrossRef
Google scholar
|
[8] |
Devisri S, Balasubramaniam C. Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific & Engineering Research, 2013, 4(2): 1-7
|
[9] |
Babu S S, Raha A, Naskar M K. LSR protocol based on nodes potentiality in trust and residual energy for WSNs. International Journal of Network Security & Its Applications (IJNSA), 2012, 4(2): 21-34
CrossRef
Google scholar
|
[10] |
Yu Y, Li K, Zhou W, Li P. Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. Journal of Network and Computer Applications, 2012, 35(3): 867-880
CrossRef
Google scholar
|
[11] |
Cho J, Swami A, Chen I. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 2011, 13(4): 562-583
CrossRef
Google scholar
|
[12] |
Zahariadis T, Trakadas P, Leligou H C, Maniatis S, Karkazis P. A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 2012, 69(2): 805-826
CrossRef
Google scholar
|
[13] |
Chen H, Wu H, Zhou X, Gao C. Reputation-based trust in wireless sensor networks. In: Proceedings of the IEEE International Conference on Multimedia and Ubiquitous Engineering, MUE’07. 2007, 603-607
|
[14] |
Momani M. Trust models in wireless sensor networks: a survey. In: Proceedings of the Recent Trends in Network Security and Applications. Springer Berlin Heidelberg. 2010, 37-46
|
[15] |
Song F, Zhao B. Trust-based LEACH protocol for wireless sensor networks. In: Proceedings of the 2nd IEEE International Conference on Future Generation Communication and Networking (FGCN). 2008, 202-207
CrossRef
Google scholar
|
[16] |
Lopez J, Roman R, Agudo I, Fernandez-Gago C. Trust management systems for wireless sensor networks: best practices. Computer Communications, 2010, 33(9): 1086-1093
CrossRef
Google scholar
|
[17] |
Al-Karaki J N, Kamal A E. Stimulating node cooperation in mobile ad hoc networks. Wireless Personal Communications, 2007, 44(2): 219-239
CrossRef
Google scholar
|
[18] |
Manikandan S P, Manimegalai R. Trust based routing to mitigate black hole attack in MANET. Life Science Journal, 2013, 10(4): 490-498
|
[19] |
Pirzada A A, Mcdonald C. Trust establishment in pure ad-hoc networks. Wireless Personal Communications, 2006, 37(1-2): 139-168
CrossRef
Google scholar
|
[20] |
Jain Y K, Sharma P. Trust based ad hoc on-demand distance vector for MANET. In: Proceedings of the National Conference on Security Issues in Network Technologies (NCSI-2012). 2012, 1-11
|
[21] |
Bulut E, Szymanski B K. Secure multi-copy routing in compromised delay tolerant networks. Wireless Personal Communications, 2012, 73(1): 149-168
CrossRef
Google scholar
|
[22] |
Chang M, Chen I-R, Bao F, Cho J-H. On integrated social and QoS trust-based routing in delay tolerant networks. Wireless Personal Communications, 2012, 66(2): 443-459
CrossRef
Google scholar
|
[23] |
Chen I-R, Bao F, Chang M, Cho J-H. Trust management for encounter-based routing in delay tolerant networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 2010, 1-6
CrossRef
Google scholar
|
[24] |
Zhang J. A survey on trust management for VANETs. In: Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA). 2011, 105-112
CrossRef
Google scholar
|
[25] |
Sun Y, Luo H, Das S K. A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6): 785-797
CrossRef
Google scholar
|
[26] |
Govindan K, Mohapatra P. Trust computations and trust dynamics in mobile Adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 2012, 14(2): 279-298
CrossRef
Google scholar
|
[27] |
El-hajj W, Safa H, Guizani M. Survey of security issues in cognitive radio networks. Journal of Internet Technology, 2011, 12(2): 181-198
|
[28] |
Yu B H, Shen Z, Miao C, Leung C, Niyato D. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 2010, 98(10): 1755-1772
CrossRef
Google scholar
|
[29] |
Momani M, Challa S. Survey of trust models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010, 1(3): 1-19
CrossRef
Google scholar
|
[30] |
Cho J-H, Swami A, Chen I R. A survey on trust management for mobile ad hoc networks. International Journal of Network Security and Its Applications (IJNSA), 2010, 13(4): 562-583
|
[31] |
Srinivasan A, Wu J. A survey on secure localization in wireless sensor networks. In: Furth, ed. Encyclopedia of wireless and mobile communications. B(Ed). Florida, USA: CRC Press, Taylor and Francis Group, 2007
|
[32] |
Fernandez-Gago M C, Roman R, Lopez J. A survey on the applicability of trust management systems for wireless sensor networks. In: Proceedings of the 3rd IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU). 2007, 25-30
|
[33] |
Brandao P, Sargento S, Crisostomo S, Prior R. Secure routing in ad hoc networks. Ad Hoc & Sensor Wireless Networks, 2005, 1(4): 277-300
|
[34] |
Khalid O, Khan S U, Madani S A, Hayat K, Khan M I, Min-Allah N, Kolodziej J, Wang L Z, Zeadally S, Chen D. Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 2013, 6(6): 669-688
CrossRef
Google scholar
|
[35] |
Maheshwari R, Gao J, Das S R. Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM). 2007, 107-115
CrossRef
Google scholar
|
[36] |
Bhosle A A, Thosar T P, Mehatre S. Black-hole and wormhole attack in routing protocol AODV in MANET. International Journal of Computer Science, Engineering and Applications (IJCSEA), 2012, 2(1): 45-54
|
[37] |
Dong D, Li M, Liu Y, Li X Y, Liao X. Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACMTransactions on Networking, 2011, 19(6): 1787-1796
CrossRef
Google scholar
|
[38] |
Moya JM, Vallejo J C, Fraga D, Araujo A, Villanueva D, de Goyeneche J-M. Using reputation systems and non-deterministic routing to secure wireless sensor networks. Sensors, 2009, 9(5): 3958-3980
CrossRef
Google scholar
|
[39] |
Zada Khan W, Xiang Y, Y Aalsalem M, Arshad Q. The selective forwarding attack in sensor networks: detections and countermeasures. International Journal of Wireless and Microwave Technologies (IJWMT), 2012, 2(2): 33-44
CrossRef
Google scholar
|
[40] |
Arya M, Jain Y K. Grayhole attack and prevention in mobile ad hoc network. International Journal of Computer Applications, 2011, 27(10): 21-26
|
[41] |
Kaur J, Kumar V. An effectual defense method against gray hole attack in wireless sensor networks. International Journal of Computer Science and Information Technologies, 2012, 3(3): 4523-4528
|
[42] |
Mohanapriya M, Krishnamurthi I. A light-weight and scalable solution for secure routing in DSR MANET for black hole attack. Ad Hoc & Sensor Wireless Networks, 2013, 17(1-2): 33-52
|
[43] |
Yang B, Yamamoto R, Tanaka Y. Historical evidence based trust management strategy against black hole attacks in MANET. In: Proceedings of the 14th IEEE International Conference on Advanced Communication Technology (ICACT). 2012, 394-399
|
[44] |
Ahmed A, Bakar K A, Channa M I. Performance analysis of adhoc on demand distance vector protocol. Journal of Computer Science, 2014, 10(9): 1466-1472
CrossRef
Google scholar
|
[45] |
Shoja M R K, Taheri H, Vakilinia S. A new approach to prevent black hole attack in AODV. International Journal of Computer Science and Information Security (IJCSIS), 2011, 9(1): 24-29
|
[46] |
Ameza F, Assam N, Beghdad R. Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security, 2010, 8(2): 112-117
|
[47] |
Zhan G, Shi W, Deng J. Design and implementation of TARF: a trustaware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 2012, 9(2): 184-197
CrossRef
Google scholar
|
[48] |
Tanuja R, Rekha M K, Manjula S H, Venugopal K R, Iyengar S, Patnaik L M. Elimination of black hole and false data injection attacks in wireless sensor networks. In: Proceedings of the 3rd International Conference on Trends in Information, Telecommunication and Computing. 2013, 475-482
CrossRef
Google scholar
|
[49] |
Chen H, Wu H, Zhou X, Gao C. Agent-based trust model in wireless sensor networks. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD). 2007, 119-124
CrossRef
Google scholar
|
[50] |
Bankovic Z, Vallejo J C, Fraga D, Moya J M. Detecting bad-mouthing attacks on reputation systems using self-organizing maps. In: Proceedings of the Computational Intelligence in Security for Information Systems. 2011, 9-16
CrossRef
Google scholar
|
[51] |
Dehnie S, Tomasin S. Detection of selfish nodes in networks using CoopMAC protocol with ARQ. IEEE Transactions on Wireless Communications, 2010, 9(7): 2328-2337
CrossRef
Google scholar
|
[52] |
Chen Z, Qiu Y, Liu J, Xu L. Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Computers & Mathematics with Applications, 2011, 62(9): 3378-3388
CrossRef
Google scholar
|
[53] |
Hernandez-Orallo E, Serrat M D, Cano J, Calafate C T, Manzoni P. Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Communications Letters, 2012, 16(5): 642-645
CrossRef
Google scholar
|
[54] |
Sun Y L, Han Z, Yu W, Liu K J R. A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: Proceedings of the 25th IEEE International Conference on Computer Communications. 2006, 1-13
|
[55] |
Gonzalez J M, Anwar M, Joshi J B D. Trust-based approaches to solve routing issues in ad-hoc wireless networks: a survey. In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, 556-563
|
[56] |
Buchegger S, Le Boudec J-Y. Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in dynamic Ad-hoc networks). In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing. 2002, 226-236
|
[57] |
Chakrabarti A, Parekh V, Ruia A. A trust based routing scheme for wireless sensor networks. In: Proceedings of the Advances in Computer Science and Information Technology, Networks and Communications. 2012, 159-169
|
[58] |
Stelios Y, Papayanoulas N, Trakadas P, Maniatis S, Leligou H C, Zahariadis T. A distributed energy-aware trust management system for secure routing in wireless sensor net<?Pub Caret?>works. In: Proceedings of the Mobile Lightweight Wireless Systems. 2009, 85-92
CrossRef
Google scholar
|
[59] |
He Q, Wu D, Khosla P. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of the Wireless Communications and Networking Conference (WCNC). 2004, 825-830
|
[60] |
Reddy Y B, Selmic R R. A trust-based approach for secure packet transfer in wireless sensor networks. International Journal on Advances in Security, 2011, 4(3): 198-207
|
[61] |
Almenarez F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. In: Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. 2006, 267-271
CrossRef
Google scholar
|
[62] |
Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the Advanced Communications and Multimedia Security. 2002, 107-121
CrossRef
Google scholar
|
[63] |
Channa M I, Ahmed K M. A reliable routing scheme for post-disaster ad hoc communication networks. Journal of Communications, 2011, 6(7): 549-557
CrossRef
Google scholar
|
[64] |
Gidijala N S, Datla S, Joshi R C. A robust trust mechanism algorithm for secure power aware AODV routing in mobile Ad hoc networks. In: Proceedings of the Contemporary Computing. 2010, 32-41
CrossRef
Google scholar
|
[65] |
Chen H. Task-based trust management for wireless sensor networks. International Journal of Security and Its Applications, 2009, 3(2): 21-26
|
[66] |
Liu S, Pang L, Pei Q, Ma H, Peng Q. Distributed event-triggered trust management for wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Information Assurance and Security. 2009, 291-294
CrossRef
Google scholar
|
[67] |
Yadav K, Srinivasan A. iTrust: an integrated trust framework for wireless sensor networks. In: Proceedings of the 2010 ACM Symposium on Applied Computing. 2010, 1466-1471
CrossRef
Google scholar
|
[68] |
Srinivasan A, Teitelbaum J, Wu J. DRBTS: distributed reputation-based beacon trust system. In: Proceddings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. 2006, 277-283
|
[69] |
Qin T, Yu H, Leung C, Shen Z, Miao C. Towards a trust aware cognitive radio architecture. ACM SIGMOBILE Mobile Computing and Communications Review, 2009, 13(2): 86-95
CrossRef
Google scholar
|
[70] |
Ganeriwal S, Balzano L K, Srivastava M B. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks, 2008, 4(3): 1-37
CrossRef
Google scholar
|
[71] |
Bansal S, Baker M. Observation-based cooperation enforcement in ad hoc networks. In: Proceedings of the Computing Research Repository (CoRR). 2003, 1-10
|
[72] |
Crosby G V, Pissinou N, Gadze J. A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS). 2006, 13-22
CrossRef
Google scholar
|
[73] |
Buchegger S, Le Boudec J-Y. A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of 3rd Workshop on Economics of Peer-to-Peer Systems (P2PEcon). 2004, 1-6
|
[74] |
Sun Y L, Yu W, Han Z, Liu K J R. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 305-317
CrossRef
Google scholar
|
[75] |
Ren K, Li T, Wan Z, Bao F, Deng R H, Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks, 2004, 45(6): 687-699
CrossRef
Google scholar
|
[76] |
Zouridaki C, Mark B L, Hejmo M, Thomas R K. A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2005, 1-10
CrossRef
Google scholar
|
[77] |
Reddy Y B, Srivathsan S. Game theory model for selective forward attacks in wireless sensor networks. In: Proceedings of the 17th IEEE Conference of Control and Automation. 2009, 458-463
CrossRef
Google scholar
|
[78] |
Lin C, Wu G, Li M, Chen X, Liu Z, Yao L. A selfish node preventive real time fault tolerant routing protocol for WSNs. In: Proceeding of the 4th International Conference on Internet of Things, Cyber, Physical and Social Computing (iThings/CPSCom). 2011, 330-337
|
[79] |
Shila D M, Anjali T. A game theoretic approach to gray hole attacks in wireless mesh networks. In: Proceedings of the IEEE Conference on Military Communications (MILCOM). 2008, 1-7
CrossRef
Google scholar
|
[80] |
Xiong L, Liu L. A reputation-based trust model for peer-to-peer eCommerce communities. In: Proceedings of the IEEE International Conference on E-Commerce. 2003, 275-284
|
[81] |
Gupta B, Mahavidhyalaya K, Kaur H, Bedi P. Predicting grid user trustworthiness using neural networks. In: Proceedings of the IEEE World Congress on Information and Communication Technologies (WICT). 2011, 727-732
CrossRef
Google scholar
|
[82] |
Zong B, Xu F, Jiao J, Lv J. A broker-assisting trust and reputation system based on artificial neural network. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. 2009, 4710-4715
CrossRef
Google scholar
|
[83] |
Baohua H, Heping H, Zhengding L. Identifying local trust value with neural network in P2P environment. In: Proceedings of the 1st IEEE and IFIP International Conference in Central Asia on Internet. 2005, 5-9
CrossRef
Google scholar
|
[84] |
Sang J, Qi Z. Research on reputation estimation system of e-commerce based on fuzzy neural network. In: Proceedings of the IEEE Control and Decision Conference (CCDC). 2010, 1866-1869
|
[85] |
Elizabeth B L, Aaishwarya R, Kiruthika P, Shrada M N, Prakash A. J, Uthariaraj V R. Bayesian based confidence model for trust inference in MANETs. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT). 2011, 402-406
CrossRef
Google scholar
|
[86] |
Begriche Y, Labiod H. A bayesian statistical model for a multipath trust-based reactive ad hoc routing protocol. In: Proceedings of the 7th IEEE International Conference on Information, Communications and Signal Processing (ICICS). 2009, 1-8
CrossRef
Google scholar
|
[87] |
Beghriche Y, Toubiana V, Labiod H. A Bayesian filter to detect misbehaving nodes in MANETs. In: Proceedings of the New Technologies, Mobility and Security (NTMS). 2008, 1-5
|
[88] |
Momani M, Challa S, Alhmouz R. BNWSN: Bayesian network trust model for wireless sensor networks. In: Proceedings of the IEEE Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA). 2008, 110-115
CrossRef
Google scholar
|
[89] |
Momani M, Aboura K, Challa S. RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Intelligent Sensors, Sensor Networks and Information. 2007, 347-352
CrossRef
Google scholar
|
[90] |
Quercia D, Hailes S, Capra L. B-trust: Bayesian trust framework for pervasive computing. Trust management. Springer Berlin Heidelberg. 2006, 298-312
|
[91] |
Dai H J, Jia Z P, Dong X N. An entropy-based trust modeling and evaluation for wireless sensor networks. In: Proceedings of the IEEE International Conference on Embedded Software and Systems (ICESS). 2008, 27-34
|
[92] |
Marti S, Giuli T J, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking. 2000, 255-265
CrossRef
Google scholar
|
[93] |
Shafer G. A mathematical theory of evidence. Princeton: Princeton University Press, 1976
|
[94] |
Jøsang A. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311
CrossRef
Google scholar
|
[95] |
Josang A, Ismail R. The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, 2002
|
[96] |
Zahariadis T, Leligou H, Karkazis P, Trakadas P, Papaefstathiou I, Vangelatos C, Besson L. Design and implementation of a trust-aware routing protocol for large WSNs. International Journal of Network Security & Its Applications, 2010, 2(3): 52-68
CrossRef
Google scholar
|
[97] |
Karp B, Kung H. GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking. 2000, 243-254
CrossRef
Google scholar
|
[98] |
Johnson D B, Maltz D A, Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Networking, 2001, 5: 139-172
|
[99] |
Royer E M, Perkins C E. An implementation study of the AODV routing protocol. In: Proceedings of the IEEE Wireless Communications and Networking Confernce (WCNC). 2000, 1003-1008
CrossRef
Google scholar
|
[100] |
Gnawali O, Fonseca R, Jamieson K, Moss D, Levis P. Collection tree protocol. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems- SenSys. 2009, 1-14
|
/
〈 | 〉 |