Trust management systems in Wireless Sensor Networks
- 1 North University of China
* Author to whom correspondence should be addressed.
Abstract
The article begins by offering a comprehensive review of the current research landscape concerning trust management mechanisms. It elucidates the foundational concepts behind trust management mechanisms, subsequently detailing various attack models and the inherent vulnerabilities they exploit. A significant portion of the discussion delves into the primary computational methodologies employed in trust management. These encompass a range of techniques such as Bayesian statistics, subjective logic, fuzzy logic, D-s evidence theory, entropy theory, cloud theory, hierarchical analysis, fog computing, and machine learning. From this foundational understanding, the piece transitions to outline the challenges poised to shape the evolution of trust management mechanisms. This section not only emphasizes the hurdles currently faced by researchers and practitioners but also attempts to forecast the potential obstacles of the future. In culmination, the article encapsulates both the current state of research and the anticipated directions that promise to steer the trajectory of trust management mechanisms in forthcoming years. This holistic perspective aims to provide readers with a clear roadmap of the field's progression, emphasizing both its achievements and the milestones yet to be attained.
Keywords
Wireless sensor networks, Trust management, Secure transmission
[1]. Hong, F., & Zhang, Y. (2006). Research on trust management mechanism. Computer Applications, 26, 56-59.
[2]. Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., & Yang, Y. (2020). Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey. Wireless Communications and Mobile Computing, 2020, 1-20.
[3]. Qi, J., Liyong, T., & Zhong, C. (2008). Trust management in wireless sensor networks. Journal of Software, 19(7), 1716-1730.
[4]. Jinfang, J., & Guangjie, H. (2020). Survey of Trust Management Mechanism in Wireless Sensor Network. Netinfo Security, 20(4), 12-20.
[5]. Shuguang, Z., Qian, W., & Hao, W. et al. (2020). Sybil attack detection scheme based on AOA in heterogeneous wireless sensor networks. Journal of University of Science and Technology of China, 50(1), 72-78.
[6]. Y J, H., H S, H., & M Q, Y. (2021). Trust-aware secure routing protocol for wireless sensor networks. Computer Engineering, 47(9), 145-152.
[7]. Sun, B., & Li, D. (2017). A comprehensive trust-aware routing protocol with Multi-attributes for WSNs. IEEE Access, 6, 4725-4741.
[8]. Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw (TOSN), 4(3), 15.
[9]. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), 437-446.
[10]. Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Foren Secur, 8(6), 924-935.
[11]. Reddy, V. B., Negi, A., & Venkataraman, S. (2018). Trust computation model using hysteresis curve for wireless sensor networks. Proc. IEEE SENSORS, 1-4.
[12]. Boubiche, D. E., Athmani, S., Boubiche, S., & Toral-Cruz, H. (2020). Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions. Springer Science + Business Media, LLC.
Cite this article
Yue,X. (2024). Trust management systems in Wireless Sensor Networks. Applied and Computational Engineering,53,220-224.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 4th International Conference on Signal Processing and Machine Learning
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).