Browse > Article
http://dx.doi.org/10.3837/tiis.2021.10.017

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey  

Wei, Zhe (School of Computer Science, Civil Aviation Flight University of China)
Yu, Shuyan (Shaoxing University Yuanpei College)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.10, 2021 , pp. 3793-3814 More about this Journal
Abstract
Most secure solutions like cryptography are software based and they are designed to mainly deal with the outside attacks for traditional networks, but such soft security is hard to be implemented in wireless sensor networks to counter the inside attacks from internal malicious nodes. To address this issue, reputation has been introduced to tackle the inside malicious nodes. Reputation is essentially a stimulating mechanism for nodes' cooperation and is employed to detect node misbehaviors and improve the trust-worthiness between individual nodes. Among the reputation models, binomial distribution based reputation has many advantages such as light weight and ease of implementation in resource-constraint sensor nodes, and accordingly researchers have proposed many insightful related methods. However, some of them either directly use the modelling results, apply the models through simple modifications, or only use the required components while ignoring the others as an integral part of the whole model, this topic still lacks a comprehensive and systematical review. Thus the motivation of this study is to provide a thorough survey concerning each detailed functional components of binomial distribution based reputation for wireless sensor networks. In addition, based on the survey results, we also argue some open research problems and suggest the directions that are worth future efforts. We believe that this study is helpful to better understanding the reputation modeling mechanism and its components for wireless sensor networks, and can further attract more related future studies.
Keywords
binomial distribution; malicious nodes; reputation; secure solution; wireless sensor networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 X. Xu, Y. Lin and S. Zhou, "Trust model based on beta distribution for sparse wireless sensor networks," Application Research of Computers, vol. 26, no. 6, pp. 2232-2234, 2009.   DOI
2 S. Buchegger and J. L. Boudec, "A robust reputation system for P2P and mobile Ad-hoc Networks," in Proc. of 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, USA, pp. 1-6, 2004.
3 X. Liu, A. Datta and K. Rzadca, "Trust beyond reputation: A computational trust model based on stereotypes," Electronic Commerce Research and Applications, vol. 12, no. 1, pp. 24-39, 2013.   DOI
4 F. Azzedin and M. Ghaleb, "Internet-of-Things and information fusion: trust perspective survey," Sensors, vol. 19, no. 8, pp. 1-22, 2019.   DOI
5 S. Rackley, Wireless Networking Technology: From Principles to Successful Implementation, Newnes: 2007, ISBN-10: 0750667885.
6 G. Casella, Statistical Inference, Duxbury Press, 1990.
7 D. V. Lindley and N. D. Singpurwalla, "Reliability and fault tree analysis using expert opinions," Journal of the American Statistical Association, vol. 81, no. 393, pp. 87-90, 1986.   DOI
8 M. West, "Bayesian aggregation," Journal of Royal Statistical Society Series A, vol. 147, no. 4, pp. 600-607, 1984.   DOI
9 G. Yin and et al., "A novel reputation model for malicious node detection in wireless sensor networks," in Proc. of 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, pp.1-4, 2008.
10 Z. A. Khan, "Using energy-efficient trust management to protect IoT networks for smart cities," Sustainable Cities and Society, vol. 40, pp. 1-15, 2018.   DOI
11 W. Fang, C. Zhu, W. Chen, W. Zhang and J. J. P. C. Rodrigues, "BDTMS: Binomial Distributionbased Trust Management Scheme for Healthcare-oriented Wireless Sensor Network," in Proc. of 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 382-387, 2018.
12 J. Lopez, R. Roman, I. Agudo and C. Fernandez-Gago, "Trust management systems for wireless sensor networks," Computer Communications, vol. 33, no. 9, pp. 1086-1093, 2010.   DOI
13 W. Fang and et al, "BTRES: beta-based trust and reputation evaluation system for wireless sensor networks," Journal of Network and Computer Applications, vol. 59, pp. 88-94, 2016.   DOI
14 H. Alzaid H., E. Foo and J. M. G. Nieto, "RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks," in Proc. of 9th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2008, Dunedin, Otago, New Zealand, pp. 419-424, 2008.
15 C. Liu, Y. Liu and Z. Zhang, "Improved reliable trust-based and energy-efficient data fusion for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-11, 2013.   DOI
16 Z. Taghikhaki, N. Meratnia and P. J. M. Havinga, "Energy-efficient Trust-based aggregation in wireless sensor networks," in Proc. of 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, pp. 584-589, 2011.
17 Z. Bankovic and et al., "Detecting bad-mouthing attacks on reputation systems using self-organizing maps," Computational Intelligence in Security for Information Systems, Lecture Notes in Computer Science, vol. 6694, pp. 9-16, 2011.
18 B. Liu, Z. Xu, J. Chen and G. Yang, "Toward reliable data analysis for Internet of Things by Bayesian dynamic modeling and computation," in Proc. of 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), Chengdu, China, pp. 1027-1031, 2015.
19 B. Liu and S. Cheng, "State space model based trust evaluation over wireless sensor networks: An iterative particle filter approach," Journal of Engineering, vol. 2017, no. 4, pp. 101-109, 2017.   DOI
20 Z. Liu, Z. Zhang, S. Liu, Y. Ke and J. Chen, "A Trust Model Based on Bayes Theorem in WSNs," in Proc. of 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, pp. 1-4, 2011.
21 M. Momani, S. Challa, Probabilistic modelling and recursive bayesian estimation of trust in wireless sensor networks, Bayesian Network, Chapter 23, 2010.
22 M. Mahmud and et al., "A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications," Cogn Comput, vol. 10, pp. 864-873, 2018.   DOI
23 A. Selvaraj and S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," Int. J. Fuzzy Syst., vol. 19, pp. 329-337, 2017.   DOI
24 Y. Wu and et al., "A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks," in Proc. of the 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, pp. 1-7, 2015.
25 W. Fang, W. Zhang, W. Chen, T. Pan, Y. Ni and Y. Yang, "Trust-based attack and defense in wireless sensor networks: a survey," Wireless Communications and Mobile Computing, vol. 2020, pp. 1-20, 2020.
26 W. Fang, N. Cui, W. Chen, W. Zhang and Y. Chen, "A Trust-Based Security System for Data Collection in Smart City," IEEE Transactions on Industrial Informatics, vol. 17, no. 6, pp. 4131-4140, 2021.   DOI
27 H. Chen, H. Wu, J. Hu and C. Gao, "Agent-Based Trust Management Model for Wireless Sensor Networks," in Proc. of International Conference on Multimedia and Ubiquitous Engineering, Busan, Korea (South), pp. 150-154, 2008.
28 M. Herlihy, "Blockchains from a distributed computing perspective," Commun. ACM, vol. 62, no. 2, pp. 78-85, 2019.   DOI
29 E. Bellini, Y. Iraqi and E. Damiani, "Blockchain-based distributed trust and reputation management systems: a survey," IEEE Access, vol. 8, pp. 21127-21151, 2020.   DOI
30 G. Shafer, A Mathematical Theory of Evidence, Princeton University, Princeton, NJ, 1976.
31 C. Esposito, A. Castiglione and F. Palmieri, "Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with dempster-shafer combination of linguistic fuzzy terms," Concurrency and Computation: Practice and Experience, vol. 30, no. 3, 2018.
32 A. Josang, "Trust and Reputation Systems," Lecture Notes in Computer Science in Foundations of Security Analysis and Design IV, vol. 4677, pp. 209-245, 2007.
33 S. Ganeriwal, L. K. Balzano and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1-37, 2008.
34 F. G. Marmol and G. M.Perez, "Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems," Computer Standards & Interfaces, vol. 32, no. 4, pp. 185- 196, 2010.   DOI
35 W. Fang and et al., "Binomial-based trust management system in wireless sensor networks," Chinese Journal of Sensors and Actuators, vol. 28, no. 5, pp. 703-708, 2015.
36 J. J. Jaramillo and R. Srikant, "A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks," Ad Hoc Networks, vol. 8, no. 4, pp. 416-429, 2020.   DOI
37 S. Shen, G. Yue, Q. Cao and F. Yu, "A survey of game theory in wireless sensor networks security," Journal of Networks, vol. 6, no. 3, pp. 521-532, 2011.
38 D. Lin and Q. Wang, "A game theory based energy efficient clustering routing protocol for WSNs," Wireless Netw, vol. 23, pp. 1101-1111, 2017.   DOI
39 W. Fang and et al., "A resilient trust management scheme for defending against reputation timevarying attacks based on beta distribution," Sci. China Inf. Sci. vol. 60, pp. 1-11, 2017.
40 X. Wu, J. Huang, J. Ling and L. Shu, "BLTM: beta and lqi based trust model for wireless sensor networks," IEEE Access, vol. 7, pp. 43679-43690, 2019.   DOI
41 V. UmaRani, K. S. Sundaram and D. Jayashree, "Enhanced Beta Trust Model in wireless sensor networks," in Proc. of 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, pp. 1-5, 2016.
42 S. Buchegger, J. Mundinger and J. L. Boudec, "Reputation Systemsfor Self-Organized Networks," IEEE Technology and Society Magazine, vol. 27, no. 1, pp. 41-47, 2008.   DOI
43 J. Hu and M. Burmeste, "LARS: a locally aware reputation system for mobile ad hoc networks," in Proc. of the 44th annual Southeast regional conference, Association for Computing Machinery, New York, USA, pp. 119-123, 2006.
44 F. G. Marmol and G. M. Perez, "Security threats scenarios in trust and reputation models for distributed systems," Computer & Security, vol. 28, no. 7, pp. 545-556, 2009.   DOI
45 Y. Huang and M. Chen, "Improve reputation evaluation of crowdsourcing participants using multidimensional index and machine learning techniques," IEEE Access, vol. 7, pp. 118055- 118067, 2019.   DOI
46 H. Feng and et al., "Trust based secure in-network data processing schema in wireless sensor networks," Journal of Networks, vol. 6, no. 2, pp. 295-302, 2011.
47 B. Liu and G. Yang, "Probabilistic trust evaluation with inaccurate reputation reports," International Journal of Distributed Sensor Networks, vol. 11, no. 6, pp. 1-7, 2015.
48 M. Momani, K. Aboura and S. Challa, "RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks," in Proc. of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, Melbourne, Australia, pp. 347-352, 2007.
49 C. R. Perez-Toro, R. K. Panta and S. Bagchi, "RDAS: reputation-based Resilient data aggregation in sensor network," in Proc. of 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Boston, MA, USA, pp. 1-9, 2010.
50 M. M. Mehdi, I. Raza and S. A. Hussain, "A game theory based trust model for vehicular ad hoc networks," Computer Networks, vol. 121, pp. 152-172, 2017.   DOI
51 G. Han, Y. He, J. Jiang, N. Wang, M. Guizani and J. A. Ansere, "A synergetic trust model based on svm in underwater acoustic sensor networks," IEEE Transactions on Vehicular Technology, vol. 68, no. 11, pp. 11239-11247, Nov. 2019.   DOI
52 J. Wang and et al., "A survey on trust evaluation based on machine learning," ACM Computing Surveys, vol. 53, no. 5, pp. 1-37, 2020.
53 A. Bellini, E. Bellini, M. Gherardelli, and F. Pirri, "Enhancing IoT data dependability through a blockchain mirror model," Future Internet, vol. 11, no. 5, p. 117, May 2019.   DOI
54 L. Yang, J. M. Kizza, A. Cemerlic and F. Liu, "Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks," in Proc. of IEEE International Conference on Intelligence and Security Informatics, pp. 75-78, 2007.
55 M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli and M. H. Rehmani, "Applications of blockchains in the internet of things: a comprehensive survey," IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1676-1717, 2019.   DOI
56 A. Josang and R. Ismail, "The beta reputation," in Proc. of 15th Bled Electronic Commerce Conference e-Reality: Construction the e-Economy, Bled, Slovenia, pp.324-327, 2002.
57 Z. Zhou and N. Shao, "An improved trust evaluation model based on bayesian for wsns," Chinese Journal of Sensors and Actuators, vol. 29, no. 6, pp. 927-933, 2016.
58 W. Fang and et al., "Trusted scheme for defending on-off attack based on beta distribution," Journal of System Simulation, vol. 27, no. 11, pp. 2722-2728, 2015.
59 A. Ahmed and A. R. Bhangwar, "WPTE: Weight-Based Probabilistic Trust Evaluation Scheme for WSN," in Proc. of 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Prague, Czech Republic, pp. 108-113, 2017.
60 M. Zhang, "Trust computation model based on improved Bayesian for wireless sensor networks," in Proc. of IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, China, pp. 960-964, 2017.
61 C. Liu, Y. Liu, and Z. Zhang, "Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-11, 2013.   DOI
62 Z. Yan, Y. Chen and Y. Shen, "A practical reputation system for pervasive social chatting," Journal of Computer and System Sciences, vol. 79, no. 5, pp. 556-572, 2013.   DOI
63 Y.Yang and et al., "Defending online reputation systems against collaborative unfair raters through signal modeling and trust," in Proc. of the ACM symposium on Applied Computing, Association for Computing Machinery, New York, USA, pp. 1308-1315, 2009.
64 S. Ozdemir, "Functional reputation based reliable data aggregation and transmission for wireless sensor networks," Computer Communications, vol. 31, no. 17, pp. 3941-3953, 2008.   DOI
65 M. Zhu, H. Chen and H. Wu, "A rank-based application-driven resilient reputation framework model for wireless sensor networks," in Proc. of International Conference on Computer Application and System Modeling, Taiyuan, China, pp. 125-129, 2010.
66 J. Li, R. Li and J. Kato, "Future trust management framework for mobile ad hoc networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 108-114, 2008.   DOI
67 Y. Yu and et al., "Trust mechanisms in wireless sensor networks: attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.   DOI
68 Y.Yu and et al., "Routing security scheme based on reputation evaluation in hierarchical ad hoc networks," Computer Networks, vol. 54, no. 9, pp. 1460-1469, 2010.   DOI
69 N. Li and S. K. Das, "A trust-based framework for data forwarding in opportunistic networks," Ad Hoc Networks, vol. 11, no. 4, pp. 1497-1509, 2013.   DOI
70 P. Mukherjee and S. Sen, "Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks," The Computer Journal, vol. 54, no. 3, pp. 482-489, 2011.   DOI
71 Z. Bankovic and et al., "Bio-inspired enhancement of reputation systems for intelligent Environments," Information Sciences, vol. 222, pp. 99-112, 2013.   DOI
72 J. Feng and et al., "Reputation system for wireless sensor networks based on beta distribution," Computer Applications, 27, 111-113, 2007.
73 N. Pissinou and G. V. Crosby, "Cluster-Based Reputation and Trust for Wireless Sensor Networks," in Proc. of 4th IEEE Consumer Communications and Networking Conference, Las Vegas, USA, pp. 604-608, 2007.
74 R. Roman, M. Carmen and J. Lopez, "Featuring trust and reputation management systems for constrained hardware devices," in Proc. of the 1st international conference on Autonomic computing and communication systems, Autonomics, article no. 6, Rome, Italy, 2007.
75 S. Liu, L. Zhang and Z. Yan, "Predict pairwise trust based on machine learning in online social networks: a survey," IEEE Access, vol. 6, pp. 51297-51318, 2018.   DOI
76 F. Almenarez and et al., "Trust management for multimedia P2P applications in autonomic networking,"Ad Hoc Networking, vol. 9, no. 4, pp. 687-697, 2011.   DOI