The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
A Dynamic Trust Model for Mobile Ad Hoc Networks
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks
DSSNS '06 Proceedings of the Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
Trust Management Problem in Distributed Wireless Sensor Networks
RTCSA '06 Proceedings of the 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
DRBTS: Distributed Reputation-based Beacon Trust System
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Using sensorranks for in-network detection of faulty readings in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Agent-based Trust Model in Wireless Sensor Networks
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 03
Malicious node detection in wireless sensor networks using weighted trust evaluation
Proceedings of the 2008 Spring simulation multiconference
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks
SEC '08 Proceedings of the 2008 Fifth IEEE International Symposium on Embedded Computing
Trust-Based LEACH Protocol for Wireless Sensor Networks
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01
Trustworthiness Assessment of Wireless Sensor Data for Business Applications
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
A Wireless Sensor Networks Based on Multi-angle Trust of Node
IFITA '09 Proceedings of the 2009 International Forum on Information Technology and Applications - Volume 01
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
A trust establishment scheme for cluster-based sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
SAPC: a secure aggregation protocol for cluster-based wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors
IEEE Intelligent Systems
T-SNIPER: Trust-Aware Sensor Network Information Protocol for Efficient Routing
WAINA '10 Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
A Routing Algorithm Based on Trustworthy Core Tree for WSN
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
ICPP '11 Proceedings of the 2011 International Conference on Parallel Processing
Trust Based Secure Localization in Wireless Sensor Networks
IPTC '11 Proceedings of the 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.