You are on page 1of 6

A Security Model for

Wireless Sensor Networks


Hosein Marzi Arash Marzi
Department of Information Systems, School of Electrical Engineering & Computer Science
St. Francis Xavier University University of Ottawa
Antigonish, NS Canada Ottawa, ON Canada
hmarzi@stfx.ca amarz052@uottawa.ca

AbstractUntil recently use of sensors to collect sensitive having communications, data exchanges or interactions within
parameters had only few risk factors such as sensor malfunction, a distributed environment. This article extends and presents the
uncertainty of data collection, or missing data coverage. Some outcome of study in security of WSN environment [21], and
issues in these categories were addressed by multi-sensor proposes improvements to the concept of Trust and Reputation
application or sensor fusion. However, advancement in Model. TRM in a general sense is combination of Bio-inspired
technology and advent of wireless sensors in a networked Trust and Reputation Model for Wireless Sensor Networks
environment, brought along a new risk factor related to the BTRM-WSN as well as Peer Trust system PTS. A review of
security in wireless sensor network. wireless sensor networks and importance of their security will
Therefore security in Wireless Sensor Network WSNs is be given here in this section. Description of Trust and
challenging and critical to the functionality of the networked Reputation Model will be presented and two security
sensors. This is very important in cases of highly secure approaches, that is, BTRM and PTS that led to the proposed
environment, especially in industrial, military, and medical model will be explored. Finally performance of the original
domains. The standard WSN protocols focus on energy approach and our proposed will be compared, leading to
efficiency; transmission efficiency, and routing. WSN is known
conclusion and planning for future research.
for limitations on hardware and software and for resources-
constrained in general. An adaptive model of security that meets A. Review of Wireless Sensor Networks
requirements and constraints in WSN is Intrusion Detections.
Wireless sensor networks consist of distributed autonomous
This article investigates security in WSN and presents a design
process for achieving optimum security based on requirements
sensors that are used for monitoring certain physical condition
and constraints in WSNs. Further, comparative results between a such as temperature, pressure, sound, motion, etc. The network
proposed technique and other security current approaches are system incorporates a gateway that provides wireless
discussed. connectivity to the distributed nodes and back to the wired
Keywords Security, wireless sensor network, trust and
network [20]. WSNs are designed to perform a variety of
reputation system, client sensors, server sensors, security level, path information processing functionalities including security and
length, energy efficiency. military sensing [11], environmental monitoring [12], as well
as healthcare supporting [13]. Applications of WSNs can vary
I. INTRODUCTION significantly in requirements and deployment environments.
Sensors have become a prevalent part of many aspects of WSNs can play a critical role in military Commands, Controls,
daily life and are greatly relied upon in technological Communications, Computing, Intelligence, Surveillances,
environments. The range of sensor usage varies from standard Reconnaissance, and Targeting (C4ISRT) systems [14]. They
to advanced levels. It is rarer to see the use of single senses to can be used to, for instance, monitor friendly and enemy
accomplish a task. Multisensors are more frequently forces, communicate commands, or sense different forms of
employed to enhance coverage and accuracy, and application attacks. Environmental applications have been proposed for
of sensor fusion has become increasingly ubiquitous [22], [23]. WSNs. Common uses of these applications are: habitat
The new technology facilitates sensor application in a monitoring, animal tracking, forest-fire detecting, precision
networked and wireless environment. While sensor fusion farming, and disaster relief. Embedding WSNs in natural
benefits significantly from wireless technology, it may suffer environment enables researchers to collect long-range data on
for security reasons. Not all applications benefit from a previously unattainable scales. WSN applications are
standard resourceful environment. In many cases, the most frequently employed in extreme environments, such as the
fundamental requirement of Wireless Sensor Networks WSNs Antarctic Pole. Several prototypes and commercial WSN
is security, under resource constraint operation. Various applications have been developed and applied for healthcare
approaches have been made to enhance network security, monitoring for the elderly, children and chronically ill people.
without heavily straining resources such as energy. In any One of the most popular categories include monitoring daily
networked environment, the security services of authentication activities for cases of fall, movement detection, location
and confidentiality are highly important factors in maintaining tracking, medical status monitoring, and meditation intake
communications. The Trust and Reputation Model (TRM) is an [13], [20]. The present work significantly improves the current
innovative security mechanism for wireless sensor networks. state of research [21] to accelerate optimal search and pareto
TRM ensures a minimum security level between two entities optimality for real-time applications.

978-1-4799-2614-5/14/$31.00 2014 IEEE


B. Issues Pertinent to Security in Wireless Sensor Networks peers). Once information about an entity has been properly
Wireless Sensor Networks need using effective protocols aggregated and weighed, a reputation score is then computed
and algorithms in order to be dispersed efficiently and securely and given base on certain algorithm. The primary objective of
in variety of applications. New protocols design and test are this procedure is to provide the clients a measurable approach
challenging, their security requirements are among the most to decide which server node is most trustworthy. The next step
important aspect which need to be clearly analyzed and is selection of the most trustworthy or reputable server entity in
defined. [15]-[19] reviews most occurring security attacks the community by the client, and commencement interaction
against Wireless Sensor Networks. The attacks can be grouped with it demanding certain service and followed by further
into five classes of selective forwarding, sinkhole attacks, Sybil interactions. After receiving the service provided, the client
attacks, wormholes, and HELLO flood attacks. will access the result and give a score of satisfaction. Based on
the satisfaction obtained, the last step, punishing or rewarding,
C. Brief description of network layer attacks in WSN is carried out. If a server node is unsuccessful in satisfying the
Selective Forwarding: In a selective forwarding attack, client with the service provider, its reputation score will suffer,
malicious nodes may assault WSN by refusing to forward and the client is likely to abstain from engaging in any future
messages, or simply dropping packages received. transaction. The following sections will introduce two
Sinkhole Attacks: In a sinkhole attack, a malicious node innovative trust and reputation models, namely BTRM-WSN
attracts all the traffic from a particular area by making itself [3], and Peer Trust [4].
look especially attractive to surrounding nodes with respect to A. Bio-inspired Trust and Reputation Model (BTRM-WSN)
the routing algorithm.
The Sybil Attacks: In Sybil attack, a malicious node BTRM-WSN [3], [21] carries out the selection of the most
disguises as other nodes by means of impersonating other trustworthy node through the most reputable path offering a
nodes, claiming false identities, or worst, generating a large certain service. It is based on a bio-inspired algorithm called
number of additional node identities using only one physical Ant Colony System (ACS) [8], where ants build paths in order
device. to fulfill certain conditions graphically. These ants leave some
Wormholes: In wormhole attacks, a malicious node located pheromone traces that help next ants to find and follow those
near the base station can tunnel messages over a low latency routes. These pheromone values will help ants find the optimal
link and thus, completely disrupting message traffic. route solutions since the optimal path will have the largest
HELLO Flood Attack: In HELLO flood attacks, attacker amount of pheromone value. When we apply this ACS
broadcasting routing or other information with stronger enough algorithm onto trust and reputation system, we use
transmission power could convince every node in the network "pheromone value" to represent the trustworthiness of sensors.
that the adversary is its neighbor.
In this BTRM-WSN, each sensor contains pheromone traces
This research focuses on trust and reputation systems
for its neighbors ([0,1]), which determines probability for an
security technique. There are other techniques used to enhance
security in WSNs such as IDS or Intrusion Detection Systems, ant to select a path as well as the senor the path leading to as a
and SRP or Secure Routing Protocols. solution. In other word, can be considered as the trust that a
sensor gives another. The detailed steps and algorithms of
BTRM-WSN are as follows [3], [21]:
II. A NEW MODEL OF SECURITY Gathering information: A set of artificial ants are created;
Trust and Reputation System management is an innovative and then they leave the client sensor. When an ant moves from
solution for maintaining a minimum security level between two a sensor i to sensor j, it gives a command for these two sensors
entities having transactions or interactions within a distributed to modify the pheromone value of the path between them via
system. Trust is a particular level of the subjective probability Eq. 1 and Eq. 2.
 = (1
)  +

with which an agent will perform a particular action; while a
reputation [6] is an expectation about an agent's behavior based (1)
on information about it or observations of its past behavior. In  = (1 + (1
) (1  )  (2)
most cases, these two terms are not distinguished explicitly and
could be used interchangeably. In WSN transactions, if we ij is the pheromone value of the path between sensor i and
define the sensors asking for services as client sensors, and sensor j; is the convergence value of ij; and is a parameter
sensors providing services as server sensors, then the client controlling the amount of pheromone left by the ants.
sensors will determine whether to have transactions with a When traveling along a WSN searching for the most
server sensor based on its trustworthiness or reputation. A trust trustworthy routing to the server providing good service, each
and reputation model is generally composed of five ant needs to decide whether to stop and return the solution to
components [1], [2]: gathering information, scoring and
ranking, selecting entities, having transaction, and reward or the client, or continue to find another one based on the
punishment. Gathering information, the first component of a reputability of the server that is has found. When ant k arrives
trust and reputation system, is responsible for collecting at sensor s, several situations may occur. The first is that sensor
behavioral information about other entities, for instance peers, s provides services. If sensor s has more neighbors that have

pheromone value ( ) of the path followed by ant k from the


agents, or paths. The information collected might come from not been visited by ant k, then k computes the average
different sources [7]. It could be first-hand (direct observation
or own experience), or second-hand (information provided by
client until the sensor s is calculated,  [0,1]). If  is greater B. Peer Trust System
that defined transition threshold (TraTh), then ant k stops and The Peer Trust Model [3],[4], [21] a dynamic peer-to-peer
returns the solution, vice versa. If sensor s has no more trust and reputation model, initially aims at estimating and
neighbors or all of them have been visited, ant k stops and evaluating the trustworthiness, or goodness, of a peer in an e-
returns solution. Another situation is that s does not provide any business environment. It identifies five factors related to trust
services. If sensor s still has neighbours that have not been and reputation management for computing the trustworthiness
visited by ant k yet, then k decides the next node to move. If value of a given peer, namely: 1) the feedback a peer retrieves
sensor s has no more neighbors or all of them have been from others; 2) the feedback scope, or field (number of
visited, ant k reaches a dead end. It has to go back to the route transactions); 3) the credibility factors of the source; 4) the
that it has built until it arrives at: 1) a sensor offering the transaction context factor addressing the criticalness of
requested service; or 2) a sensor not offering the requested transactions; as well as 5) the community context factors
service but having more neighbors not visited yet. Scoring and interpreting related characteristic. In a given WSN, the trust
ranking: Client will examine and assess the quality of the value of a peer u could be computed via Eq. 4.

T(u) = 234 S(u, i) CR(p(u, i)) TF(u, i) + CF(u)


0(1)
solution brought back by each launched ant. The quality of path

(4)
could be calculated by Eq. 3.

Q(S ) = %A


( ) !"
(3) T(u) denotes the value of trustworthiness of peer u.
ij is the pheromone value of the path between sensor i and denotes the weight factor for the collective evaluation, a
sensor j; is the convergence value of ij; and is a parameter weighted average of amount of satisfaction that peer u receives;
controlling the amount of pheromone left by the ants. and denotes the weight factor for the community context
S denotes the solution brought back by ant k, it is factor. I(u) denotes the total number of transactions that peer u
has had with all other peers. S(u,i) denotes the normalized the
Q(S ) denotes the quality of path S ;  denotes the average
represented the path leading to the sensor selected;
amount of satisfaction which peer u receives in its ith
path pheromone of path S found by and k; PLF[0,1] denotes transaction. Some existing reputation-based systems simply
a path length factor; and %A denote the percentage of ants apply a binary reputation mechanism to evaluate the degree of
that have selected the same solution as ant k. After computing satisfaction, where 0 represents unsatisfied, while 1 represent
the path quality of all solution brought back by ants, the client satisfied. However, this evaluating system may not function
selects the path with highest score and store it as Current_Best well [9], since malicious node may hide its misbehavior via
solution. Then the client compares the path quality with the increasing its transaction volume. Taking that into
consideration, a normalized satisfaction value is applied, where:
(1,2)6789:;
S(u, i) = , and S(u, i)<2=>? represent the binary
best solution (Global_Best) found by earlier transactions. If
0(1)
Current_Best solution is even better, then the client will
replace the previous Global_Best with the Current_Best satisfaction (0 or 1) peer u received in its ith transaction. Also,
solution. Then an extra ant is sent to modify the pheromone CR(p(u,i)) denotes the credibility of the feedback that peer u
value of the current Global_Best. receives from the ith peer (p(u,i)) it has transaction with. The
Having Transaction: After the client selects the reason why credibility of the feedback is important is that a
Global_Best solution, it will have transaction with the selected peer may make false statements for other peers. For instance, a
sensor. After receiving the service, the client will compare it malicious sensor may give low satisfaction for a benevolent
with the default service which the client expects to obtain. sensor, or give high satisfaction for a malicious sensor. As a
There are two possible scenarios: first, the selected server result, a credibility of feedback should be introduced; and
sensor might be completely benevolent and provide the exact feedback with higher credibility should be weighed more in
same service as it is supposed to; or it could be totally computing the trustworthiness of a give peer. Two mechanisms
malicious and provide extremely difference service. In the evaluating the credibility of feedback is introduced. Eq. 5.
former scenario, the client is satisfied and will give a illustrates the first mechanism, and the metric using this one to
satisfaction value (Sat) as a random number between PunTh measure credibility of feedback is called TTVM (where TVM
and 1; while in the latter scenario, the satisfaction value (Sat) stands for Trust Value Measurement). This mechanism uses the
is determined as a random number between 0 and PunTh as the trust value of peer p(u,i) to evaluate the trustworthiness of
client is considered as unsatisfied. PunTh is a predefined feedback received from it to peer u.
CR@p(u, i)A = D(E)
punishment threshold value. B(C(1,2))
7FG B(C(1,2))
(5)
Giving Reward or Punishment: A client will request the
desired service to what it things to be the most trustworthy Eq. 6. introduces a personalized similarity measurement

this one to measure credibility of feedback is called THI .. If


server via the most reputable route. Then punish or reward will (PSM) to rate the credibility of peer (u,i), and the metric using
be given to all link in this route based on whether the client is
satisfied with the service provided by the server. This is done we use w to represents the client sensor which wants to test
by increasing or decreasing the pheromone value of the path. whether u is trustworthy, then Sim(p(u,i),w) is used to
measures the personalized similarity between peer w and
T(u) = 234
peer(u,i). This is computed via Eq. 7., where IJS(p(u,i).w) is 0(1) (1,2)
0(1)
(8)
the common set of peers which peer w and peer p(u,i) have had

the set of peers; IJS(p(u, i), w) denotes the two vectors of


transaction with in the past, and x denotes a peer belonging to Similar to the original algorithm used in Peer Trust system,
the first step is to find a set of active server sensors. Then to
feedback by peer w and peer p(u,i); and compute the trustworthiness of a specific sensor (sensor u in
Q(R,S(T,U)) Q(R,X)
UFG M(N,O(P,)) UFG M(N,W) Y
( ) our case), the client collect the satisfaction value that sensor u
V(N,O(P,)) V(N,W)
denote the standard
received from its previous transactions. I(u) denotes the total
deviation of the two feedback vectors.
CR(p(u, i), w) =
2Z(C(1,2),[)
number of transaction that sensor u has had before. Here
D(E)
\FG 2Z(C(1,2),[)
(6) instead of using a random number between 0.5 and 1 to
represent satisfaction, and between 0 and 0.5 to represent
D(`,a(E,7)) D(`,E)
_(`,a(E,7)) _(`,E)

Sim(p(u, i), u) = ^(j0f(C(1,2).1)


( 7FG c 7FG )d
dissatisfaction, we simply use 1 and 0 to simplify the process
D(`,b) D(`,E)
hhhhhhhhhhhhhhhhhhhhhhhhhhhi|
|0f(C(1,g),1)
(7) to make the result more stable. The second modification is that
TF(u,i) denotes the transaction context factor of peer us ith when the client determines which sensor is more trustworthy, it
transaction. This is another importance factor since each not only considers the path quality which is computed via Eq.
transaction may differ from one another. Transaction contexts 3., but also the trust value computed via Eq. 8. A sensor has to
including size or category can have influence on the TF(u,i) outperform others in terms of both path quality and
value. Finally, CF(u) denotes the community context factor trustworthiness to be selected as the final solution.
which could be applied to address some community-specific
issues, for instance, incentive problem. IV. PERFORMANCE ANALYSIS
We conduct three experiments simulating the proposed
EBTRM system in order to evaluate its performance and to
III. ENHANCED BIO-INSPIRED TRUST AND REPUTATION compare it with the other two original approaches, namely
SYSTEM (BTERM) BTRM-WSN, and Peer Trust system. The first experiment
In this section we proposed an Enhanced bio-inspired trust aims at comparing the three systems in terms of the accuracy in
and reputation system inspired by BTRM-WSN and Peer Trust searching for trustworthy sensors, which evaluates the level of
system demonstrated in previous section. As mentioned in security provided; the second test compares the average path
length leading to the trustworthy sensors selected, which
earlier, the criterion that BTRM-WSN used to determine
evaluates the efficiency, or the easiness in finding trustworthy
whether a sensor is trustworthy is the value of the average sensors, of the three systems; and finally, the overall energy
pheromone value of the solution path from the client sensor to consumption of the WSNs applying these systems, which
the sensor selected. Similarly, the quality of each solution is evaluates the energy efficiency of the systems is also
evaluated based on the average pheromone value, the length of compared.
those solution paths, as well as the number of ants which have
A. TRMSim-WSN
found the same solution. This approach has been proven to be
quite effective; however, the performance of this system may TRMSim-WSN [10], [21] is a Java-based trust and
get improved if the condition of the server sensors could be reputation model simulator aiming at providing an easy way to
test a trust and reputation model over WSNs and to compare it
taken into account. So, we are considering the possibility of
against other models. Work has been done to develop similar
adding some principles in Peer Trust system into the original model in C++. Partial test carried out indicated that the
BTRM-WSN, and to examine if this will modify some aspects execution time is significantly reduced. On this basis, a WSN
of the original system. The first modification is that when an template was designed using the same Network Parameter
ant determines whether a sensor that it reaches is trust worthy settings in TRM-WSN as: Clients: 15%, Relay Servers: 5%,
or not, it not only compares the average pheromone of the path Radio Range: 10, Min. Number of Nodes: 200, Max Number
leading to the sensor to a predefined threshold value, but also of Nodes: 200, Number of Network 500, Number of
the trust value of that sensor which is computed by a simplified Execution: 100. Then the simulator will randomly create WSN
Peer Trust algorithm. If the trust value of the sensor is larger for experiments based this template. Note that 15% of all nodes
than a user-defined threshold value, then the sensor will be in a randomly created WSN are clients which will request
default services. The other 85% nodes will act as servers which
considered as trustworthy, and vice versa. To compute the
will be asked to provide services upon request. The following
trustworthiness of a sensor by applying Peer Trust principles, subsections provide details of tests being conducted using new
only satisfaction that a sensor received from other sensors with software environment.
which it had transactions is considered. The original algorithm
(Eq. 8) is not applied here as it consumes too much resources. B. Accuracy
For instances, more memory are required to hold the data, and Here we use the concept accuracy to evaluate the
more energy is consumed to perform all these calculation. reliability and level of security provided by the trust and
Even though the performance in finding benevolent server reputation system. The accuracy of a trust and reputation
sensors might be better, we still want the proposed system to system is represented by the percentage that the number of
times when it successful selects trustworthy sensors (the
be energy efficient.
former situation) out of the total number of transactions. A Table 2: average path length leading to trustworthy sensors,
better trust and reputation system should have a good control COMPARISON OF BTRM-WSN, PEER TRUST, AND EBTRM
of the negative influence which the malicious nodes have on Accuracy in Percentage of Malicious Sensors
Searching for
the WSN. TABLE 1. compares Accuracy of the BTRM-WSN, Trustworthy 10% 20% 30% 40% 50% 60% 70% 80% 90%
Peer Trust system, as well as the proposed EBTRM system. Sensors (%)
From the previous discussion, we can conclude that when the BTRM-
2.22 2.25 2.23 2.26 2.29 2.39 2.56 2.74 3.62
percentage of malicious sensors is not high (less than 40%), the WSN
difference between these three trust and reputation system in TRM Peer
6.45 6.52 6.55 6.57 6.6 6.65 6.72 6.78 7.05
Trust
terms of accurately finding trustworthy sensor is not EBTRM 2.97 3.00 3.06 3.07 3.18 3.16 3.24 3.36 4.23
significant, and they can all achieve accuracy of 98%.
However, when the situation is getting more unsecured (the
percentage of malicious sensor is getting higher), we can tell D. Conservation of Energy and Its Consumption
that the proposed EBTRM can provide the highest accuracy Energy consumption of the network is the overall energy
and thus the highest level of reliability and security. consumed in: 1) client nodes sending request messages; 2)
TABLE 1. ACCURACY IN SEARCHING FOR TRUSTWORTHY SENSORS, server nodes sending response services; 3) energy consumed
COMPARISON OF BTRM-WSN, PEER TRUST, AND EBTRM
by malicious nodes which provide bad services; 4) relay nodes
Accuracy in Percentage of Malicious Sensors which do not provide services; and 5) the energy to execute the
Searching for
Trustworthy
trustworthy sensor searching process of a certain trust and
10% 20% 30% 40% 50% 60% 70% 80% 90% reputation system. How to effectively reduce energy
Sensors (%)
BTRM- consumption is a major issue in WSN researches.
99.88 99.63 99.35 99.03 98.72 98.01 97.33 96.01 93.01
WSN
TABLE 3. compares the BTRM-WSN, Peer Trust system, as
TRM Peer
Trust
99.87 99.48 98.88 98.55 98.07 97.45 96.55 92.01 67.79 well as the proposed EBTRM system in terms of overall
EBTRM 99.95 99.87 99.73 99.35 99.04 98.64 97.89 96.83 96.17 network energy consumption. Accordingly, Peer Trust system
outperforms BTRM-WSN and the proposed EBTRM in terms
The comparative results of TABLE 1 with the three security of energy efficiency significantly. EBTRM is slightly less
models of Bio-inspired Trust and Reputation Model, Peer Trust energy efficient than BTRM model, when the percentage of
Model, and Enhanced Bio-inspired Reputation Model confirms malicious sensors is getting higher.
that EBTRM has higher accuracy in searching for trustworthy TABLE 3: OVERALL NETWORK ENERGY CONSUMPTION, COMPARISON OF
sensors. A better trust and reputation system should have a BTRM-WSN, PEER TRUST, AND EBTRM
Accuracy in Percentage of Malicious Sensors
good control of the negative influence which the malicious Searching for
nodes have on the WSN. TABLE 1 compares the BTRM-WSN, Trustworthy 10% 20% 30% 40% 50% 60% 70% 80% 90%
Peer Trust system, as well as the proposed EBTRM system in Sensors (%)
terms of accuracy BTRM-
1.42 1.60 2.22 2.63 3.00 3.75 4.31 5.75 11.42
WSN
C. Path Length TRM Peer
0.28 0.33 0.38 0.42 0.47 0.51 0.59 0.71 1.05
Trust
Path length is the average hops leading to the most EBTRM
trustworthy sensors which are selected by the client in a WSN 2.3 2.6 2.96 3.41 3.92 4.4 4.76 5.87 12.21
applying a certain type of trust and reputation system. It is
assumed that less average path length indicates a better E. Overall Performance Analysis
performance in efficiency and easiness in searching for
From these simulations we conducted, conclusion could be
trustworthy sensors of a trust and reputation system. This is
drawn that our proposed EBTRM system successfully
because: 1) less number of intermediaries means higher
increases the accuracy in finding trustworthy sensors and thus
security level and less energy consumption; and 2) shorter path
the level of security of the original BTRM-WSN without
length implies that it is easier to find trustworthy nodes and
sacrifice its advantage in finding trustworthy sensors
thus, server nodes will response quicker to client nodes. Fig. 2.
efficiently, and the extra amount of energy required for those
will compare the BTRM-WSN, Peer Trust system, as well as
add-ons is acceptable. EBTRM is proven to be able to
the proposed EBTRM system in terms of average path length
accurately distinguish benevolent sensors from malicious
leading to trustworthy sensors. BTRM-WSN has the best
sensors and thus protect WSNs from attackers. And more
performance, and Peer Trust has the worst performance in
importantly, the level of security it provides is not influenced
terms of shorting average path length. However, the difference
by the number of attackers as much as its two competitors do.
between BTRM-WSN and our proposed EBTRM is not
The trade-off is that, especially when the network is in a
significant. Thus in smaller size WSN, we can consider that
relatively secured status (where there are only a small number
they can both provide an easy and efficient approach in
of malicious sensors), it becomes more complicated and less
searching trustworthy sensors.
energy efficient to search for trustworthy sensors because of
TABLE.2. presents a comparison between average path
the extra conditioning and computation. However, the
lengths leading to trustworthy sensor. The BTRM holds the
difference is not significant. Overall, the modification is
minimum of average path length. However, Enhance Bio-
successful, and our proposed EBTRM provide a better solution
inspired Trust and Reputation Model is close to the minimum
to WSNs where a high level of security is required.
values of BTRM.
V. CONCLUSION [6] Abdul-Rahman, A. and S. Hailes. "Supporting Trust in Virtual
Communities." System Sciences, 2000. Proceedings of the 33rd Annual
In this study, two current solutions related to trust and
Hawaii International Conference on . London, UK: IEEE, (2000)September.
reputation systems namely Bio-inspired Trust and Reputation
[7] Srinivasan, A., et al. "Reputation and Trust-based Systems for Ad
Systems, and Peer Trust Systems for Wireless Sensor Hoc and Sensor Networks." On Trust Establishment in Mobile Ad-Hoc
Networks are reviewed. In order to produce stronger security Networks. Ed. A. Boukerche. Wiley & Sons, 2007.
environment for WSNs an enhanced model of bio-inspired [8] Dorigo, M., Birattari, M and Stutzle, T.,. "Ant Colony
trust and reputation model is designed and implemented. The Optimization." Computational Intelligence Magazine, IEEE 1.4 (2006), 28-39.
objectives of the enhanced model are to guarantee an [9] Dellarocas, C. "Analyzing the Economic Efficiency of EBay-Like
increased level of security within wireless sensor networks Online Reputation Reporting Mechanisms." Proceedings of the 3rd ACM
without compromising the behavior of the original model as conference on Electronic Commerce. NY, USA: ACM, (2001), 171-179.
well as keeping the energy consumption to its lowest possible. [10] Mrmol, F. G. and G. M. Prez. "TRMSim-WSN, Trust and
In this investigation, based on the results presented earlier, Reputation Models Simulator for Wireless Sensor Networks."
it is evident that the proposed enhanced system is offering an Communications, 2009. ICC '09. IEEE International Conference on. Dresden:
increased level of accuracy in detecting trustworthy sensors IEEE, (2009), 1-5.
which in return increases the security level of wireless sensor [11] Callaway, E. H. Wireless Sensor Networks: Architectures and
networks without sacrificing efficiency in finding trustworthy Protocols. Boca Raton, FL: Auerbach Publications, (2004).
sensors, in comparison with the original model and only with [12] Zhao, F. and L. J. Guibas. Wireless Sensor Networks: An
Information Processing Approach. Amsterdam: Morgan Kaufmann, (2004).
an insignificant and acceptable level of energy consumption
[13] Alemdar, H. and C. Ersoy. "Wireless Sensor Networks for
increase. Comparing to the other two earlier models the
Healthcare: A Survey." Computer Networks 54.15 (2010): 2688-2710.
proposed enhanced model is able to find trustworthy sensors
[14] Martincic, F. and L. Schwiebert. "Introduction to Wireless Sensor
with greater accuracy. On the other hand BTRM operates with
Networking." Handbook of Sensor Networks: Algorithms and Architectures.
slightly less average distance between client and selected Hoboken, NJ, USA: John Wiley & Sons, (2005).
trustworthy sensors as well as overall network energy [15] Dimitrievski, V. P. and D. Davcex. Security Issues and
consumption is slightly less as compared with EBTRM. Approaches in WSN. Skopje, Republic of Macedonia: Department of
In conclusion the enhanced mechanism of EBTRM is able computer science, Faculty of Electrical Engineering and Information
to improve security level by increasing the accuracy in finding Technology, (2011).
the trustworthy sensors. The research will continue to improve [16] Gerrigagoitia, K.; Uribeetxeberria, R.; Zurutuza, U.; Arenaza, I.,
the ease of search and energy consumption while maintain Reputation-based Intrusion Detection System for wireless sensor networks,
enhanced security. This work significantly shortened Complexity in Engineering (COMPENG 2012), June 11-13, (2012), Aachen.
execution time through changing software environment. [17] Hortos, W.S., Bio-inspired, cross-layer protocol design for
Considering multi-objectives decision making, the optimum intrusion detection and identification in wireless sensor networks, 2012 IEEE
solution depends on the particular requirements, which may 37th Conference on Local Computer Networks Workshops (LCN Workshops),
differ for different environment or applications. Therefore Oct 22-25, (2012), 1030-1037.
developing pareto optimality facilitates selection of optimum [18] Xiaoyong Li, Feng Zhou, Junping Du, LDTS: A Lightweight and
Dependable Trust System for Clustered Wireless Sensor Networks, IEEE
solutions. Ideally the new extension will be conducted using
Transactions on Information Forensics and Security, June (2013), Vol. 8 , Iss.
HPC resources to develop near real-time solution.
6, pp. 924-935.
[19] Naveed, A.; and Kanhere, S.; Authntication and Confidentiality in
REFERENCES Wireless Ad Hoc Networks; Chapter 1 of: Beyah, R,; McNair, J; and Corbett,
[1] Marti, S. and H. Garcia-Molina. "Taxonomy of Trust: C.; Security in Ad Hoc and Sensor Network, ISBN: 13 978 981 4271 08 0,
Categorizing P2P Reputation Systems." Computer Networks 50.4 (2006): (2010), World Science.
472-484. [20] Dargie, W.; and Poellabauer, C.; Fundamentals of wireless Sensor
[2] Mrmol, F. G. and G. M. Prez. "Towards Pre-Standardization of Networks: Theory and Practice; John Wiley (2010), ISBN: 978 0 470 99765 9
Trust and Reputation Models for Distributed and Heterogeneous Systems." [21] Marzi, H.; and Li, M.; An Enhanced Bio-Inspired Trust and
Computer Standards' Interfaces 32.4 (2010): 185-196.J. Clerk Maxwell, A Reputation Model for Wireless Sensor Network, Elsevier Procedia Computer
Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, Science, June (2013), Pages 11591166, Vol. 19.
1892, pp.6873.
[22] Marzi, H. Sensor Fusion and Use of Reconfigurable Neural
[3] Mrmol, F. G. and G. M. Prez. "Providing Trust in Wireless Networks in Condition Monitoring, Proceedings of IEEE International
Sensor Networks Using a Bio-Inspired Technique." Telecommunication Conference on Computational Intelligence for Measurement Systems and
Systems 46.2 (2011): 163-180. Applications, CIMSA 2005, July 20-22, (2005), pp. 145 150, Giardini
[4] Xiong, L. and L. Liu. "PeerTrust: Supporting Reputation-Based Naxos, Sicily, Italy.
Trust for Peer-to-Peer Electronic Communities." Knowledge and Data [23] Marzi, H., Modular Neural Network Architecture for Precise
Engineering, IEEE Transactions on 16.7 (2004): 843-857. Condition Monitoring, IEEE Transactions on Instrumentation and
[5] Gambetta, D. "Can We Trust Trust?" Trust: Making and Breaking Measurement, April (2008), Vol. 57, No. 4.
Cooperative Relations. Ed. D. Gambetta. Department of Sociology University
of Oxford, 2000. 213-237.

You might also like