Management and applications of trust in Wireless Sensor Networks: A survey

  • Authors:
  • Guangjie Han;Jinfang Jiang;Lei Shu;Jianwei Niu;Han-Chieh Chao

  • Affiliations:
  • Department of Information & Communication Systems, Hohai University, Changzhou, China and Changzhou Key Laboratory of Sensor Networks and Environmental Sensing, Changzhou, China;Department of Information & Communication Systems, Hohai University, Changzhou, China and Changzhou Key Laboratory of Sensor Networks and Environmental Sensing, Changzhou, China;College of Electronic Information and Computer, Guangdong University of Petrochemical Technology, China;School of Computer Science and Engineering, Beihang University, Beijing, China;Institute of Computer Science and Information Engineering, Taiwan and Department of Electronic Engineering, National Ilan University, I-Lan, Taiwan and Department of Electrical Engineering, Nation ...

  • Venue:
  • Journal of Computer and System Sciences
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.