Browse > Article
http://dx.doi.org/10.3837/tiis.0000.00.012

A Survey of Trust Management in WSNs, Internet of Things and Future Internet  

Chang, Kai-Di (Department of Electrical Engineering, National Taiwan University of Science and Technology)
Chen, Jiann-Liang (Department of Electrical Engineering, National Taiwan University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.1, 2012 , pp. 5-23 More about this Journal
Abstract
Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.
Keywords
Wireless sensor networks; IoT; M2M; trust management; future Internet;
Citations & Related Records

Times Cited By Web Of Science : 2  (Related Records In Web of Science)
Times Cited By SCOPUS : 2
연도 인용수 순위
  • Reference
1 J. I. Vazquez et al., "Communication architectures and experiences for web-connected physical smart objects," in Proc.of 2010 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 684-689, 2010.
2 L. Yan, Y. Zhang, Laurence, T. Yang, and H. Ning, "Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems," Auerbach Publications, 2008.
3 E. Renault, "Toward a security model for the future network of information," in Proc. of 4th International Conference on Ubiquitous Information Technologies & Applications, Dec. 2009.
4 Liang Zhou and Han-Chieh Chao, "Multimedia traffic security architecture for the internet of things," in Proc. of IEEE Network, vol. 25, pp. 35-40, 2011.
5 H. Ning, N. Ning, S. Qu, Y. Zhang, and H. Yang, "Layered structure and management in Internet of things," in Proc. of Future Generation Communication and Networking, vol. 2, pp. 386-389, Dec. 2007.
6 Georgios Tselentis, Alex Galis, Anastasius Gavras, Srdjan Krco, Volkmar Lotz, Elena Simperl, Burkhard Stiller and Theodore Zahariadis, "Towards the future Internet-emerging trends from European research", IOS Press, 2010.
7 Yun Wang and Kai Li, "Topology mining of sensor networks for smart home environments," International Journal of Ad Hoc and Ubiquitous Computing, vol. 7, no.3 pp. 163-173, 2011.
8 M. Ma and Y. Yang, "Adaptive triangular deployment algorithm for unattended mobile sensor networks," IEEE Transactions on Computers, vol. 56, no. 7, pp. 946-847, Jul. 2007.
9 L. Kong, X. Liu, Z. Li and M.-Y Wu, "Automatic barrier coverage formation with mobile sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
10 X. Xu, H. Jiang, L. Huang, H. Xu and M. Xiao, "A reputation - based revising scheme for localization in wireless sensor networks," in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, 2010.
11 H. Chen, Y.T. Chan, H.V. Poor and K. Sezaki, "Range-free localization with the radical line," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
12 Huang Y. M., Hsieh M. Y., Chao H. C., Hung S. H. and Park J. H., "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, pp. 400-411, 2009.
13 S. Article (CrossRef Link) Ganeriwal, Laura K. Balzano and Mani B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Transactions on Sensor Networks (TOSN), vol. 4, no.3, May. 2008.
14 Mo Jamshidi, "From large scale systems to cyber-physical systems," Journal of Internet Technology, vol. 12, no. 3, pp. 367-374, 2011.
15 Y. Hong, K.-S. Lui and Y.-C. Wu, "HEA-Loc: A Robust localization algorithm for sensor networks of diversified topologies," in Proc. of IEEE on Wireless Communications and Networking Conference (WCNC), pp.1-6, Apr. 2010.
16 Yi-Wei Ma, Chin-Feng Lai, Chia-Cheng Hu, Ming-Chiao Chen and Yueh-Min Huang, "RFID-based seamless multimedia services for smart homes," International Journal of Internet Protocol Technology, vol. 4, no. 4, pp. 232-239, 2009.   DOI   ScienceOn
17 Q. Zhu, R. Wang, Q. Chen, Y. Liu and W. Qin, "IOT Gateway: bridging wireless sensor networks into Internet of things," in Proc. of International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347-352, Dec. 2010.
18 Huansheng Ning and Ziou Wang, "Future Internet of things architecture: Like mankind neural system or social organization framework?," IEEE Communications Letters, vol. 15, pp. 461-463, 2011.
19 C. Zhu, L. Shu, T. Hara, L. Wang and S. Nishio, "A survey on mobile sensor networks," Osaka University, Technical Report, Aug. 2010.
20 ITU, "The Internet of Things," ITU International Reports, 2005.
21 "Internet of Things in 2020," in Proc. of INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems Groups in co-operation with the RFID working Group of the EPoSS, 2008.
22 Qian Xiaocong and Zhang Jidong, "Study on the structure of "Internet of Things(IOT)" business operation support platform," in Proc. of 2010 12th IEEE International Conference on Communication Technology (ICCT), pp. 1068-1071, Nov. 2010.
23 F. Thiesse, C. Floerkemeier, M. Harrison, F. Michahelles and C. Roduner, "Technology, standards, and real-world deployments of the EPC network," in Proc. of IEEE Internet Computing, vol. 13, pp. 36-43, Mar. 2009.
24 G. Broll, et al., "Perci: pervasive serviceinteraction with the Internet of things," in Proc. of IEEE Internet Computing, vol. 13, pp. 74-81, Dec. 2009.
25 EPCglobal, "The EPCglobal architecture framework," final version 1.3, 2009.
26 J. P. Conti, "The Internet of things," in Proc. of Communication Engineering, vol. 4, pp. 20-25, 2006.
27 M.C. Fernandez-Gago, R. Roman and J. Lopez, "A survey on the applicability of trust management systems for wireless sensor networks," Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU, pp. 25-30, Jul. 2007.
28 X. Zhang, "Decentralized sensor-coordination optimization for mobile multi-target tracking in wireless sensor networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2010.
29 W. Jin and Z. Xi, "Sensor self-organization for mobile multi-target tracking in decentralized wireless sensor networks," IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Apr. 2010.
30 X. Wang, L. Ding and D. Bi, "Reputation-enabled self-modification for target sensing in wireless sensor networks," IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 1, pp. 171-179, Jan. 2010.
31 R.A. Shaikh, H. Jameel, B.J. d'Auriol, H. Lee, S. Lee and Y.-J. Song, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, Nov. 2009.
32 H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell and J.A. Luke, "Trust-aware in-network aggregation for wireless sensor networks," IEEE Global Telecommunications Conference, pp. 1-8, Dec. 2009.
33 S. Chen, Y. Zhang; P. Liu and J. Feng, "Coping with traitor attacks in reputation models for wireless sensor networks," IEEE Global Telecommunications Conference , pp. 1-6, Dec. 2010.
34 R. Akbani, T. Korkmaz and G. Raju, "A machine learning based reputation system for defending against malicious node behavior," IEEE Global Telecommunications Conference, pp. 1-5, Dec. 4 2008.
35 C.Y. Chen, H.C. Chao, T.Y. Wu, C.I Fan, J.L. Chen, Y.S. Chen, and J.M. Hsu, "IoT-IMS communication platform for future Internet," Journal of Adaptive, Resilient and Autonomic Systems, IGI Global, vol. 2, no. 4, 2011.