DOI QR코드

DOI QR Code

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di (Department of Electrical Engineering, National Taiwan University of Science and Technology) ;
  • Chen, Jiann-Liang (Department of Electrical Engineering, National Taiwan University of Science and Technology)
  • Received : 2011.09.19
  • Accepted : 2012.01.07
  • Published : 2012.01.30

Abstract

Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

Keywords

References

  1. EPCglobal, "The EPCglobal architecture framework," final version 1.3, 2009.
  2. J. P. Conti, "The Internet of things," in Proc. of Communication Engineering, vol. 4, pp. 20-25, 2006.
  3. ITU, "The Internet of Things," ITU International Reports, 2005.
  4. "Internet of Things in 2020," in Proc. of INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems Groups in co-operation with the RFID working Group of the EPoSS, 2008.
  5. Qian Xiaocong and Zhang Jidong, "Study on the structure of "Internet of Things(IOT)" business operation support platform," in Proc. of 2010 12th IEEE International Conference on Communication Technology (ICCT), pp. 1068-1071, Nov. 2010.
  6. F. Thiesse, C. Floerkemeier, M. Harrison, F. Michahelles and C. Roduner, "Technology, standards, and real-world deployments of the EPC network," in Proc. of IEEE Internet Computing, vol. 13, pp. 36-43, Mar. 2009.
  7. G. Broll, et al., "Perci: pervasive serviceinteraction with the Internet of things," in Proc. of IEEE Internet Computing, vol. 13, pp. 74-81, Dec. 2009.
  8. J. I. Vazquez et al., "Communication architectures and experiences for web-connected physical smart objects," in Proc.of 2010 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 684-689, 2010.
  9. L. Yan, Y. Zhang, Laurence, T. Yang, and H. Ning, "Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems," Auerbach Publications, 2008.
  10. E. Renault, "Toward a security model for the future network of information," in Proc. of 4th International Conference on Ubiquitous Information Technologies & Applications, Dec. 2009.
  11. Liang Zhou and Han-Chieh Chao, "Multimedia traffic security architecture for the internet of things," in Proc. of IEEE Network, vol. 25, pp. 35-40, 2011.
  12. H. Ning, N. Ning, S. Qu, Y. Zhang, and H. Yang, "Layered structure and management in Internet of things," in Proc. of Future Generation Communication and Networking, vol. 2, pp. 386-389, Dec. 2007.
  13. Georgios Tselentis, Alex Galis, Anastasius Gavras, Srdjan Krco, Volkmar Lotz, Elena Simperl, Burkhard Stiller and Theodore Zahariadis, "Towards the future Internet-emerging trends from European research", IOS Press, 2010.
  14. Yun Wang and Kai Li, "Topology mining of sensor networks for smart home environments," International Journal of Ad Hoc and Ubiquitous Computing, vol. 7, no.3 pp. 163-173, 2011.
  15. Huang Y. M., Hsieh M. Y., Chao H. C., Hung S. H. and Park J. H., "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, pp. 400-411, 2009.
  16. S. Article (CrossRef Link) Ganeriwal, Laura K. Balzano and Mani B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Transactions on Sensor Networks (TOSN), vol. 4, no.3, May. 2008.
  17. Mo Jamshidi, "From large scale systems to cyber-physical systems," Journal of Internet Technology, vol. 12, no. 3, pp. 367-374, 2011.
  18. Yi-Wei Ma, Chin-Feng Lai, Chia-Cheng Hu, Ming-Chiao Chen and Yueh-Min Huang, "RFID-based seamless multimedia services for smart homes," International Journal of Internet Protocol Technology, vol. 4, no. 4, pp. 232-239, 2009. https://doi.org/10.1504/IJIPT.2009.029272
  19. Q. Zhu, R. Wang, Q. Chen, Y. Liu and W. Qin, "IOT Gateway: bridging wireless sensor networks into Internet of things," in Proc. of International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347-352, Dec. 2010.
  20. Huansheng Ning and Ziou Wang, "Future Internet of things architecture: Like mankind neural system or social organization framework?," IEEE Communications Letters, vol. 15, pp. 461-463, 2011.
  21. Y. Hong, K.-S. Lui and Y.-C. Wu, "HEA-Loc: A Robust localization algorithm for sensor networks of diversified topologies," in Proc. of IEEE on Wireless Communications and Networking Conference (WCNC), pp.1-6, Apr. 2010.
  22. C. Zhu, L. Shu, T. Hara, L. Wang and S. Nishio, "A survey on mobile sensor networks," Osaka University, Technical Report, Aug. 2010.
  23. M. Ma and Y. Yang, "Adaptive triangular deployment algorithm for unattended mobile sensor networks," IEEE Transactions on Computers, vol. 56, no. 7, pp. 946-847, Jul. 2007.
  24. L. Kong, X. Liu, Z. Li and M.-Y Wu, "Automatic barrier coverage formation with mobile sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
  25. X. Xu, H. Jiang, L. Huang, H. Xu and M. Xiao, "A reputation - based revising scheme for localization in wireless sensor networks," in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, 2010.
  26. H. Chen, Y.T. Chan, H.V. Poor and K. Sezaki, "Range-free localization with the radical line," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
  27. X. Zhang, "Decentralized sensor-coordination optimization for mobile multi-target tracking in wireless sensor networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2010.
  28. W. Jin and Z. Xi, "Sensor self-organization for mobile multi-target tracking in decentralized wireless sensor networks," IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Apr. 2010.
  29. X. Wang, L. Ding and D. Bi, "Reputation-enabled self-modification for target sensing in wireless sensor networks," IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 1, pp. 171-179, Jan. 2010.
  30. M.C. Fernandez-Gago, R. Roman and J. Lopez, "A survey on the applicability of trust management systems for wireless sensor networks," Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU, pp. 25-30, Jul. 2007.
  31. R.A. Shaikh, H. Jameel, B.J. d'Auriol, H. Lee, S. Lee and Y.-J. Song, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, Nov. 2009.
  32. H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell and J.A. Luke, "Trust-aware in-network aggregation for wireless sensor networks," IEEE Global Telecommunications Conference, pp. 1-8, Dec. 2009.
  33. S. Chen, Y. Zhang; P. Liu and J. Feng, "Coping with traitor attacks in reputation models for wireless sensor networks," IEEE Global Telecommunications Conference , pp. 1-6, Dec. 2010.
  34. R. Akbani, T. Korkmaz and G. Raju, "A machine learning based reputation system for defending against malicious node behavior," IEEE Global Telecommunications Conference, pp. 1-5, Dec. 4 2008.
  35. C.Y. Chen, H.C. Chao, T.Y. Wu, C.I Fan, J.L. Chen, Y.S. Chen, and J.M. Hsu, "IoT-IMS communication platform for future Internet," Journal of Adaptive, Resilient and Autonomic Systems, IGI Global, vol. 2, no. 4, 2011.

Cited by

  1. 키 전환이 필요 없는 완전 준동형 암호화 기법 vol.c38, pp.5, 2012, https://doi.org/10.7840/kics.2013.38c.5.428
  2. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme vol.11, pp.11, 2012, https://doi.org/10.1155/2015/859731
  3. Intelligence in Ecology: How Internet of Things Expands Insights into the Missing CO2Sink vol.2016, pp.None, 2012, https://doi.org/10.1155/2016/4589723
  4. IoT 환경에서 컨텍스트 기반 적응적 멀티미디어 스트리밍 기법 vol.19, pp.7, 2012, https://doi.org/10.9717/kmms.2016.19.7.1166
  5. 스마트시티의 빅 센서 데이터와 빅 GIS 데이터를 융합하여 실시간 온라인 소음지도로 시각화하기 위한 분산병렬처리 방법론 vol.19, pp.4, 2018, https://doi.org/10.7472/jksii.2018.19.4.1
  6. A Distributed Trust Management Mechanism for the Internet of Things Using a Multi-Service Approach vol.103, pp.3, 2012, https://doi.org/10.1007/s11277-018-5942-8