skip to main content
10.1145/1516241.1516346acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks

Published: 15 February 2009 Publication History

Abstract

Energy consumption is one of the most important parameters for evaluation of a scheme proposed for WSNs because of their resource constraint nature. Comprehensive comparative analysis of proposed reputation-based trust management schemes of WSNs from this perspective is currently not available in the literature. In this paper, we have filled this gap by first proposing Generic Communication Protocol (GCP) that is used to exchange trust values. Based on this proposed GCP protocol, we have presented a theoretical energy consumption analysis and evaluation of three state-of-the-art reputation-based trust management schemes of WSNs.

References

[1]
A. Boukerche, X. Li, and K. EL-Khatib. Trust-based security for wireless ad hoc and sensor networks. Computer Comm., 30:2413--2427, Sept. 2007.
[2]
S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In Proc. of ACM Security for Ad-hoc and Sensor Networks, pages 66--67, Oct. 2004.
[3]
T. Grandison and M. Sloman. A survey of trust in internet applications. IEEE Comm. Surveys & Tutorials, 3(4), 2000.
[4]
M. Gupta, P. Judge, and M. Ammar. A reputation system for peer-to-peer networks. In Proc. of the 13th Int. workshop on Network and operating systems support for digital audio and video, pages 144--152, Monterey, CA, USA, June 2003.
[5]
C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In Proc. of the 2nd Int. Conf. on Embedded networked sensor systems, pages 162--175, Baltimore, MD, USA, Nov. 2004.
[6]
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems: Facilitating trust in internet interactions. Comm. of the ACM, 43(12):45--48, 2000.
[7]
R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y.-J. Song. Group-based trust management scheme for clustered wireless sensor networks. will be published in IEEE Transaction on Parallel and Distributed Systems.
[8]
R. A. Shaikh, S. Lee, M. A. U. Khan, and Y. J. Song. LSec: Lightweight security protocol for distributed wireless sensor network. In 11th IFIP Int. Conf. on Personal Wireless Comm., LNCS 4217, pages 367--377, Albacete, Spain, Sept. 2006.
[9]
Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. on Selected Areas in Comm., 24(2):305--317, Feb. 2006.
[10]
H. O. Tan and I. Korpeoglu. Power efficient data gathering and aggregation in wireless sensor networks. ACM SIGMOD Record, 32(4):66--71, Dec. 2003.
[11]
Z. Yao, D. Kim, and Y. Doh. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proc. of the 3rd IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems, pages 437--446, Vancouver, Canada, Oct. 2006.

Cited By

View all
  • (2012)A Survey on Measures for Secure Routing in Wireless Sensor NetworksInternational Journal of Sensor Networks and Data Communications10.4303/ijsndc/2355481(1-17)Online publication date: 2012
  • (2010)Trust control in heterogeneous networks for Internet of Things2010 International Conference on Computer Application and System Modeling (ICCASM 2010)10.1109/ICCASM.2010.5620458(V1-632-V1-636)Online publication date: Oct-2010

Index Terms

  1. Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
      February 2009
      704 pages
      ISBN:9781605584058
      DOI:10.1145/1516241
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 February 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. reputation
      2. sensor networks
      3. trust evaluation
      4. trust management

      Qualifiers

      • Research-article

      Funding Sources

      • Ministry of Information and Communication (MIC), Korea, under the ITFSIP (IT Foreign Specialist Inviting Program) supervised by the IITA (Institute of Information Technology Advancement)
      • Ministry of Knowledge Economy

      Conference

      ICUIMC '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 251 of 941 submissions, 27%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2012)A Survey on Measures for Secure Routing in Wireless Sensor NetworksInternational Journal of Sensor Networks and Data Communications10.4303/ijsndc/2355481(1-17)Online publication date: 2012
      • (2010)Trust control in heterogeneous networks for Internet of Things2010 International Conference on Computer Application and System Modeling (ICCASM 2010)10.1109/ICCASM.2010.5620458(V1-632-V1-636)Online publication date: Oct-2010

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media