TY - JOUR
T1 - Management and applications of trust in Wireless Sensor Networks
T2 - A survey
AU - Han, Guangjie
AU - Jiang, Jinfang
AU - Shu, Lei
AU - Niu, Jianwei
AU - Chao, Han Chieh
PY - 2014/5
Y1 - 2014/5
N2 - Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.
AB - Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.
KW - Cluster-based WSNs
KW - Trust models
KW - Wireless Sensor Networks
UR - https://www.scopus.com/pages/publications/84891933258
U2 - 10.1016/j.jcss.2013.06.014
DO - 10.1016/j.jcss.2013.06.014
M3 - 文章
AN - SCOPUS:84891933258
SN - 0022-0000
VL - 80
SP - 602
EP - 617
JO - Journal of Computer and System Sciences
JF - Journal of Computer and System Sciences
IS - 3
ER -