Journal
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
Volume 80, Issue 3, Pages 602-617Publisher
ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jcss.2013.06.014
Keywords
Wireless Sensor Networks; Trust models; Cluster-based WSNs
Funding
- Applied Basic Research Program of Changzhou Science and Technology Bureau [CJ20120028]
- Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry
- Innovative Research Program for Graduates of Hohai Univ. [CGB014-09]
Ask authors/readers for more resources
Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs. Crown Copyright (C) 2013 Published by Elsevier Inc. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available