Trust Management
Trust Management
Abstract—Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or
irregular intervals between sink visits. The absence of an online trusted third party implies that existing WSN trust management schemes
are not applicable to UWSNs. In this paper, we propose a trust management scheme for UWSNs to provide efficient and robust trust data
storage and trust generation. For trust data storage, we employ a geographic hash table to identify storage nodes and to significantly
decrease storage cost. We use subjective logic based consensus techniques to mitigate trust fluctuations caused by environmental factors.
We exploit a set of trust similarity functions to detect trust outliers and to sustain trust pollution attacks. We demonstrate, through extensive
analyses and simulations, that the proposed scheme is efficient, robust and scalable.
Index Terms—Unattended wireless sensor network (UWSN), distributed trust management, subjective logic
1 INTRODUCTION
W IRELESS Sensor Networks (WSNs) have been used in
challenging, hostile environments for various applications
such as forest fire detection, battlefield surveillance, habitat
management system is required to handle trust related
information in a secure and reliable way. It should deal with
uncertainty caused by noisy communication channels and
monitoring, traffic management, etc. One common assumption unstable sensor behavior.
in traditional WSNs is that a trusted third party, e.g., a sink, is We propose a trust management scheme for efficient trust
always available to collect sensed data in a near-to-real-time generation as well as scalable and robust trust data storage in
fashion. UWSNs. A central issue for trust management in UWSNs is
Although many WSNs operate in such a mode, there are how to store trust data without relying on a trusted third party.
WSN applications that do not fit into the real time data Initially, we consider two simple trust management schemes as
collection model. Consider an example of a monitoring system a first-step attempt to address the existing trust storage
deployed in a natural park to detect poaching activities. The problems in UWSNs. After analyzing the shortcomings of these
lack of regular access routes and the size of the surveillance simple schemes, we propose an advanced scheme based on a
area would require a mobile sink to collect data periodically [1]. Geographic Hash Table (GHT) [10]. Our advanced scheme
Another example is an underwater mobile sensor network for allows sensor nodes to put and get trust data to and from
submarine tracking and harbor monitoring. The inaccessibility designated storage nodes based on node IDs. Sensor nodes do
of the protected area and other technical problems make it not need to know the IDs of storage nodes. They use a hash
difficult to maintain continuous connections between sink and function to find locations of the storage nodes, which
sensors [2]. Fig. 1 shows an example of Unattended WSNs significantly reduce the storage cost. We also propose a set of
(UWSNs) [1], [3]-[5] with a mobile sink visiting the network at similarity threshold functions to remove outliers from trust
either fixed or irregular intervals to collect data. opinions. This prevents attackers from generating false trust
Trust management becomes very important for detecting opinions and from polluting trustworthiness. Furthermore, we
malicious nodes in unattended hostile environments. provide a detailed analysis of the proposed scheme and
conduct a comprehensive simulation-based study to
demonstrate that our scheme is efficient, robust, and scalable.
The rest of the paper is organized as follows. Related work
• Y. Ren is with the Department of Information and Communication
Technology, University of Ager, Grimstad 4898, Norway, and also with the
is reviewed in Section 2. Section 3 defines the network scenario,
Department of Computer Science, National Chiao Tung University, security model and design goals. Section 4 presents some
Hsinchu, Taiwan. E-mail: [email protected]. background material on trust management in sensor networks
• V. Oleshchuk and F. Li are with the Department of Information and and on subjective logic. Section 5 introduces our solutions for
Communication Technology, University of Ager, Grimstad 4898, Norway. efficient trust data storage. Section 6 reports a simulation-based
E-mail: {vladimir.oleshchuk, frank.li}@uia.no.
• V. Zadorozhny is with the School of Information Sciences, University of study conducted to evaluate the efficiency and the robustness
Pittsburgh, Pittsburgh, PA 15260 USA. E-mail: [email protected]. of the proposed schemes. Section 7 considers advanced
Manuscript received 30 Mar. 2012; revised 23 Dec. 2012; accepted 24 Jan. approaches to reliable trust generation. Section 8 offers
2013. Date of publication 14 Feb. 2013; date of current version 2 July 2014. conclusions.
For information on obtaining reprints of this article, please send e-mail to:
[email protected], and reference the Digital Object Identifier below.
Digital Object Identifier 10.1109/TMC.2013.22
It can also assist in secure routing [6], [7], secure data dis-
tribution [8], and trusted key exchange [9]. An efficient trust
1536-1233 © 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
1410 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 7, JULY 2014
about other sensors’ trustworthiness are referred as trust unattended physical area with a high density of sensor nodes.
consumers. The relationship between trust producer, trust 4) Efficiency. The designed trust management scheme
manager and trust consumer is illustrated in Fig. 3. should be efficient in terms of both communication cost and
We assume further that time is split into equal time intervals storage cost.
and that sensors maintain loosely synchronized clocks. At time 5) ConSiStency. Trust opinions generated by trust producers
interval t, sj’s neighbor bi generates a trust opinion Tij,t and trust queries sent from trust consumers should be routed
regarding sj . Note that trust consumers can be anywhere in the correctly to trust managers where the trust data are stored.
network but trust producers are only within the transmission
range of the corresponding sensor. Furthermore, there is a 3.4 Performance Metrics
mobile sink visiting the network at either fixed or irregular time The following metrics are defined to evaluate the performance
intervals to collect data from sensors. of our scheme.
• Pr[Survival] t is defined as the probability that at least one
j
2 In this paper trust data means trust related data, such as opin ions, trust measurement, etc., which are used by trust management scheme to make trust
aware decisions.
1412 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 7, JULY 2014
example, it can be a watchdog A trust level can be naturally defined using the SL opinions,
mechanism that monitors the e.g., T1 = {0.0, 0.93, 0.07} for low trust value and T2 = {0.88, 0.0,
0.12} for higher one.
behavior of neighboring nodes. The
Definition 2. Let SX, SY and SZ be three SenSorS. Then T YX = {BYX ,
work in [12] uses the Bayesian DYX, UYX} and TZX = {BZX, DZX, UZX} denote the opinionS of
approach for assessing node SY and SZ about the truStworthineSS of SX. Their com- bind (3)
reputation and trust evolution. consensus opinion is defined as TY Z = Ty ® TX = {BYX Z , DYX Z ,
Node capture attacks [27], where UYX Z} where BYX Z = (BYXUZX + BZX UYX)/(UYX + UX , UXU, X) D,X
nodes are removed from the network (DXUX, +DXUX)(UX+UX UXUX)
for an indefinite amount of time, UZ -UY UZ ), DY,Z = (DY UZ + DZ UY)/(UY + UZ -UY UZ ) and
UYX,Z = (UYXU, ZX)/(UYX + UZX - UYXUZX).
can be detected by their neighbors.
One-shot probing is proposed in The trust value expressed as subjective opinions instead of
one simple trust level provides a more flexible trust model of
[28] to identify misbehaving nodes. the real world. Therefore, according to Def. 2, the nj consensus
The authors in [29] consider the of trust opinions generated by sensors {bi}i=1 in time interval t
about sensor sj is
trust inference problem as a
shortest path calculation in a T
I t e...e j e...e j = Ti-,i, ,n . (1)
weighted directed graph. They
utilize the theory of semirings for Definition 3. Let sX and sY be two sensors. Then {TYX-t1 -...-TYX-tn}
trust evaluation. denotes the opinion of sY about the trustworthiness of sX for time
In this study, we assume that sensor nodes may use the intervals {t1 -...tn} respectively, where TYX-tn = {BYX-tn - DYX-tn - UYX-tn
analyses and scoring sensor trust approaches (e.g., [12], [27]- }. Then sY’s opinion about the trustworthiness of sx on 11 U • • • U
[29]) to generate trust opinions. That is, in a time interval t, sj’s tn is defined as
neighbors, {bi}in=j 1, can generate trust opinions Tj’t (i e {1, ..., nj})
regarding Sj, by monitoring Sj's prior behavior. TX,t 1u-utn = {BX,I 1u-utn DX,I 1u-utn uX,t 1u-utn} (2)
[0, 1] and B+D+ U = 1, and that B, D, and U correSpond to belief, time asj, follows: 1) with respect to sensor consensus: Yj _
T t 1uyutn _ Tj’t 1 ' tn ^ • • • ^ Tj,ti ' tn ^ • • • ^
diSbelief and uncertainty reSpectively.
,n
1, ••• ,i ••• j 1 i
; and u2)u with urespect
Tn. 1u utn to time: Yj _ Tj, 1u^ utn _u nu! 1, ••• ,i, ••• ,nj
{Bt 1u7u tn D,t 1 7 tn Uji 1 ?u tn where j 1 y tn _
1,••• ,i,••• ,nj’ 1,••• ,i,••• ,nj’ 1,••• ,i,••• ,nj1,••• ,i,••• ,nj
1 (B,t 1 +_ B,tn ), D,t 1 u?utn _ 1 (D,t 1 +
n\ 1, ••• ,i, ••• ,nj 1, ••• ,i, ••• ,nfi’ 1, ••• ,i, ••• ,nj n\ 1, ••• ,i, ••• ,nj
••• + D.: . tn
), and U^ 1 V tn _ (U’
u u 1 1
1. +••• +
1, ••• ,i, ••• -nj ’ 1, ••• ,i, ••• ,nj n\ 1, ••• ,i, ••• ,nj
U^t-n )
^1, ••• ^i, ••• ,nj'' (0.99x0.88+0.8), 1 (0.99x0.03+0.38), 1-2 (0.99*0.88+ 0.8) - 2 (0.99
Remark. According to Def. 3, each trust opinion has the same x 0.03 + 0.38)} _ {0.8712, 0.0297, 0.0991}.
impact over time. Meanwhile, it is more realistic to design However, we will consider this extension in our future
the scheme to be time-aware such that the newer trust work. The reasons are because that specifying a suitable value
opinions have higher impact on the trustworthiness, while of f is not a trivial task and it needs to be further investigated.
prior trust opinions should be also taken into account. A For example, given f _ 0.99 or f _ 0.88, it is not clear which one is
straightforward solution is to use a time factor (e.g., f e [0- more reasonable and how f varies over time. Due to page limit,
we are not able to include any results on time-aware solutions
1]) adding time impact into prior trust opinions, where
in this paper. Indeed, this aspect is the focus in our more recent
greater f indicates newer opinion. More specifically, the work on subjective logic based machine learning (Bayesian
time-aware trust opinion can be computed as Tj’t 1u^utn _ {B’ network) techniques for time-aware trustworthiness estab-
1u^utn, D’ 1u^utn, U^ 1u^utn}, where Bi 1u^utn _ 1 (f -1 Bi, 1 + ••• j-1 + B^t1), D’ 1
- n
lishment. We refer interested readers to [30] for more details on
^ t _ (f -1 D, 1 + ...fj-1 + D ), and Ui 1 ^ t _ 1 - Bj 1u^utn - Di’ 1u^utn. For
n 1 n tn - u u n -
subjective logic and to [31]—[33] for examples of the
example, given Ti _ {0.88- 0.3- 0.09}, Ti _ {0.8- 0.38- 0.09},
j-t-1 j- t application of subjective logic in WSNs and social networks.
and f _ 0.99, Tij-t-1ut can be computed as Tij-t-1ut _ {1
REN ET AL.: NOVEL APPROACH TO TRUST MANAGEMENT 1413
memory. In other words, bi is not only one of sj’s trust that, both pre-compromised and post-compromised trust data
producers but also one of sj ’s trust managers.
can be deleted by ADV _Del. Therefore, we need to hide trust
The SI includes local storage of trust opinion, and trust
managers from ADV_Del. Next we propose Basic Scheme II that
opinion querying and calculation:
supports distributed trust data storage.
(1) Local storage of trust opinion. At every time interval, each
sensor generates trust opinions about its neighbor nodes,
5.2 Basic Scheme II (SII) - Distributed Trust Data
combines it with previous trust opinions according to Eq. (2)
Storage
and stores it locally. Note that the generated trust opinions are In order to address the shortcomings of the SI, we should
combined as a combined trust opinion resulting in very low ensure that: (1) a sensor sj’s trust producer and trust manager
storage cost. For instance, bi generates Tij,t1 , jt jt are not the same node; (2) ADV cannot easily find trust manager
Ti 2 and Ti 3 at t1, t2 and t3, respectively, and stores the combined nodes; and (3) the scheme is resilient against node failures.
trust opinion in its memory as Tj = Tj’t0Ut 1Ut2Ut3. A straightforward solution would be to specify for each
(2) Trust opinion querying and calculation. Consider the node a designated trust manager node that stores its trust data.
The trust manager should not be one of the node’s direct
example in Fig. 2. Assume that sensor sa wants to estimate the
neighbors. The components of the SII scheme are defined as
trustworthiness Yj of another sensor, sj. It broadcasts a trust
follows:
opinion request, ASK(T*), to ask sensors to collect opinions of (1) System initialization. To provide trust data redundancy,
other sensors about Sj. Here, we assume a suitable broadcast at the beginning, each sensor sj is associated with a randomly
authentication protocol, e.g., multilevel pTESLA [34], for secure selected trust managers {TMr}0=1. The IDs of those trust
and reliable transmission of such broadcast values. If there is no managers, {TMr}0=1, are stored in the trust producers before
direct relationship between two sensors (e.g., Sh and Sj), they deployment since the trust producers need to send the
have highest uncertain opinion score about each other’s generated trust opinions to those trust managers, {TMj }r =1. In
r a
each sensor sends feedback messages, ANS(T*), to sa if they memory so that trust consumers are able to retrieve sj’s trust
data from {TMjr}ra=1.
have a direct relationship with Sj. Otherwise they just drop
(2) Trust opinion distributed storage. After generating trust
ASK(Tj). Next, sa combines received sensors’ opinions using a
opinions about sj, the trust producers of sj send them to
consensus operator (Eq. (1)) to compute sj’s trustworthiness Yj,
{TMjr}ra=1. Note that, in every time interval, TMjr receives j,t nj
and stores the results.
nj trust opinions {Ti }i=1 from bi e B(sj) (i e [1, nj]). After receiving
Proposition 4. In the Basic Scheme I, the probability that at least one {T j,t} n j , TM r first removes outlier trust opinions as noise (we
i i = 1 j
trust manager node remains uncompromised within t time
will further discuss this in Section 7). Then it combines the
intervals is
trustworthiness of previous time intervals with the received
Pr[survival]t = 1, k * t < nj (4) trust opinions according to Def. 3 and j j j, 1 ^•••U t
Pr[survival]t = 0, k * t > nj , j, 1 ^•••U t — 1 j,t
Def. 2 as follows: Yr = Yr = Yr U Yr =
where nj is the number of neighbor nodes and k is the Yr1U Ut 1U(T1’t®---®Tnt), where Yr’t is the trustworthiness of sj
compromising capability of ADV as defined in Section 3.2. stored in TMjr during the time interval t.
Proof. In SI, each sensor sj has nj trust managers and nj trust (3) Trustworthiness query and calculation. Trust consumers
producers in its transmission range. It is easy for ADV to send ASK(Tj*) to {TMjr}ra=1 to retrieve trustworthiness {Yrj}ra=1 from
find the trust managers in the transmission range of sj. sj’s trust manager nodes. Upon receiving a trustworthiness,
Within each time interval ADV compromises k sensors (trust trust consumers remove outliers using the similarity threshold
managers) in sj’s transmission range. By the end of t-th time functions defined in Section 7
interval, k * t sensors (trust managers) are compromised.
Therefore, k * t > nj implies that all the trust managers are
compromised, i.e., Pr[survival]jt = 0; otherwise Pr[survival]t =
1. □
1414 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 7, JULY 2014
Fig. 4. Comparison of SI, SII and AS using Eq. (4) and Eq. (5) with default setting: N = 10000, k = 5 and t = 150. (a) Pr [survival]t vs. N. (b) Pr
[survival]t vs. k. (c) Pr[survival]t vs. t.
trust manager (see {TMjr}r3=1 in Fig. 5), can receive the trust Proof. The same as for Proposition 5. The numerical results are
opinions and trust query requests. The AS includes the shown in Fig. 4. □
following phases:
(1) System initialization. Each node is preloaded with a
secure hash function, denoted as h(•), and the redundancy 6 EFFICIENCY AND ROBUSTNESS k
factor a specified by the mobile sink depending on application EVALUATION N — (t — 1
scenarios. All nodes know their own locations, and the )k
In this section we conduct a set of
locations of the nodes which are one hop away. simulations in MATLAB to show that AS has the strongest
(2) Trust opinion storage based on GHT. During the time performance among these three schemes in terms of both
interval t, and after Tij,t is generated, bi uses the function Put(sj, efficiency and robustness. We consider an UWSN where 10000
Tij,t, r) to put Tij,t to a trust managers. In other words, bi performs nodes are randomly distributed in a 3000 x3000 units area. The
other parameters are set as follows. Each sensor has
hr(sj) to obtain Lj1 ,...,Lja, and then sends Tij,t to locations Lj1 ,...,Lja
transmission range 0 = 150 units. ADV _Del has compromising
using GPSR, respectively. The closest node to location Ljr, capability k = 25. The number of trust managers nodes a = 3.
denoted as TMjr, finally receives the trust opinion Tij,t and is The simulation results are averaged over 20 randomly
called the r-th trust manager node of sj. deployed networks and are explained below.
Fig. 6(a)-(c) show the performance of t in terms of how
(3) Trust opinion querying and calculation. A trust consumer
many intervals the network can survive, given different a, k and
node, e.g., sh, wants to know the trustworthiness of sj. It uses 0. It demonstrates that SII and AS have better performance than
the function Get(sj, r) Vr e [1, a] to get trustworthiness {Yr}a=1 SI does with respect to t for all values of a, k and 0. We observe
from Sjzs a trust manager nodes. Similar as the put process, Sh in Fig. 6(a) that increasing a improves the performance of t.
performs hr (sj) to obtain Lj, • • • , La, and sends ASK(Tj) to Meanwhile, increasing k decreases the performance of t. Fig.
6(c) shows that 0 has no impact on SII and AS in terms of t but
locations Lj, ••• , La using GPSR. The closest nodes to Lj, ••• , L®,
slightly increases the performance of t in SI.
i.e., trust manager nodes {TMr} £=1, finally receive ASK(Tj) and Fig. 7(a)-(c) display the performance in terms of com-
then send {Yr)a=j to Sh. munication cost C for different a, k and 0 . Distributed trust
trust query and pull path ■■■> trust push path o sensor node
Fig. 5. Simple example of GHT techniques on UWSNs with a = 3.
Proposition 6. The BaSic Scheme II and the Advanced Scheme have
the Same Pr[Survival]t. That iS
7 TRUSTWORTHINESS GENERATION
Through the simulations and discussions in the previous
section, we have demonstrated that AS significantly reduces
storage cost caused by distributed data storage and provides
resilience to ADV _Del. In this section, we continue to
investigate the performance of the proposed schemes against
trustworthiness pollution attacks (i.e., ADV _Noise, ADV _Homo
and ADV _Hbd) defined in Section 3.2.
Initially, for each sensor sj, trust opinion Tij,0 could be set by
a mobile sink based on such information as physical protection,
REN ET AL.: NOVEL APPROACH TO TRUST MANAGEMENT 1417
Fig. 9. Consensus is enough, cT = {0.3, 0.3, 0.4}, ac = 0.01, fT = {0.3, 0.3, 0.4}, af = 0.1.
Fig. 10. Example of when ADV tries to increase Tj, cT = {0.1,0.3, 0.6}, fT = {0.4, 0.1,0.5}, ac = af = 0.01.
opinions as cT = {0.3, 0.3, 0.4}3 and ac = 0.01, where cB, cD ~ decrease T in the second simulation.
N(0.3, 0.001), and cU = 1 - cB - cD. In order to monitor Simulation one. In order to increase T, ADV _Homo increases
environmental effect, we set a certain percentage PrC of sensors B and decreases D simultaneously. That is, generate fT that
to generate trust opinions with larger af = 0.1. satisfies E(cB) < E(fB) and E(cD) > E(fD). We select a special case
Fig. 9 shows the simulation results of SI, SII and AS when when cT = {0.1, 0.3, 0.6}, fT = {0.4, 0.1, 0.5} and ac = af = 0.01. The
different values of PrC (from 10% to 40%) are specified. These simulation results are shown in Fig. 10. The same as in the other
figures display three elements B, D and U in white, green (light figures, the results for SI are plotted in the first row, while the
shadow), and red (black) respectively. The first row of Fig. 9 is SII and AS results are shown in the second row. It is interesting
the simulation results of SI. As one can observe that, after the to see that the results of SI experience sharp steps and jitters
20th time interval, the obtained trustworthiness T starts to after the 20th time interval. Those sharp steps and jitters
become unstable. In addition, increasing the percentage PrC of indicate that SI is not resilient to ADV _Homo attacks. In con-
anomalous sensors makes T more unstable. The second row of trast, the results of SII and AS are smoother compared with that
Fig. 9 shows the results for the SII and AS schemes. It is of SI. The smoother result means that trust consensus does
interesting to emphasize that T is very smooth for all values of effectively mitigate the effect of AD V _Homo. In addition, when
PrC. The anomalous trust opinions have almost no influence on PrC increases, T starts to increase. The reason is that more
T. We observe a slight increase T when PrC = 40% in Fig. 9(h). sensors generate false trust opinions, increasing the impact of
This is because that the consensus operation reduces trust false trust opinion fT on trustworthiness T.
uncertainty. Comparing the first row of Fig. 9 and the second Simulation two. To decrease T as much as possible, ADV
row of Fig. 9, it is easy to see that SII and AS are more resilient _Homo decreases B and increases D simultaneously.
against ADV _Noise than SI is. Therefore, trust consensus
improves resilience against ADV_Noise, i.e., d^j, E(ajm)) ^ 0 (a e
{B, D, U}).
3 Our simulations are conducted using random trust values and distribution paremeters. To exhibit the impact of ADV’s attacks as clear as possible, we
select suitable values (e.g., cT={0.3,0.3,0.4}, ac = 0.01, etc.) to plot simulation results (figures). The same simulation parameter configuration applies to the rest
of the paper.
1418 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 7, JULY 2014
Fig. 11. Example of when ADV tries to decrease Tj, cT = {0.4, 0.1,0.5}, fT = {0.1,0.3, 0.6}, ac = af = 0.01.
That is, E(cB) > E(fB) and E(cD) < E(fD). We set cT = {0.4, 0.1, negatives. However, since the threshold function is based on
0.5}, fT = {0.1, 0.3, 0.6}, ac = af = 0.01 in the simulation. We how far Bij is from its expected value E(Bjm), and E(Bjm) is the
observe, in Fig. 11, that trust consensus does not mitigate ADV average value of both cB and fB, the selection of e may be
_Homo. After the 20th time interval, T starts to decrease sharply.problematic.
Similar to simulation one, increasing PrC has heavier influence As shown in Fig. 12, decreasing e increases true positives.
on T, and SII and AS have better performance than SI does. However, it also increases false positives. Fig. 12(a) shows that
Through the simulation results shown above, we conclude a major part of fB and a small part of cB are considered to be
that TC-ONLY is not resilient against ADV _Homo attack. outliers. A small part of false trust opinions are considered to
be correct trust opinions (false negative), if a suitable similarity
7.1.3 Trust Resilience against ADV _Hbd threshold factor e is specified. When e is too small, as shown in
Recall that ADV _Hbd aims to manipulate trustworthiness T, it Fig. 12(b), all false trust opinions are considered to be outliers.
is able to increase or decrease T in any way. However, as shown However, more than half of the correct trust opinions are also
in Figs. 10 and 11, trust consensus does not perform well in considered to be outliers. In contrast, when e is too large, more
either increasing T or decreasing T attacks. than half of the false
Discussion. From the simulation results shown above, it is
easy to conclude that TC-ONLY is not enough for trustwor-
thiness calculation. It can only sustain ADV _Noise caused by
environmental effects. The reason is that using trust consensus
for trust calculation decreases uncertainty U and makes T
stable. However, it does not performance well against ADV
_Homo and ADV _Hbd. The reason is that both correct trust
opinions cT and false trust opinions fT are taken into account in
trustworthiness calculation as input, resulting in polluted T .
One way to solve this problem is to reduce the effect of fT as
much as possible. Thus we propose the next scheme capable of
removing false trust opinions.
4 Please note that the percentage of compromised sensors can be configured randomly in the range of [0,50%). Due to page limit, we only illustrate the
results with 20% compromised nodes.
1420 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 7, JULY 2014
Fig. 14. Example of when ADV tries to increase Tj, cT = {0.1,0.3, 0.6}, fT = {0.4, 0.1,0.5}, ac = af = 0.01.
(A) SI: PrC=20% (B) SI: P1C=2O%, e=0.2 (C) SI: PrC=20%, e=0.4 (D) SI: PrC=20%, e=0.6 (E) SI: PrC=20%, e=0.S
Fig. 15. Example of when ADV tries to decrease Tj, cT = {0.4, 0.1, 0.5}, fT = {0.1, 0.3, 0.6}, ac = af = 0.01.
The results based on TC-ONLY are plotted in the first column. 7.4 Three Parameters with Weighted Factors (T-
As one can observe, the performance of T-PARA is much PARA-WF)
better in comparison with TC-ONLY when a suitable similarity In order to provide a more flexible threshold function to
threshold factor e is specified (see Fig. 18(h)-(j) as well as Fig. prevent ADV from pollution attacks, we further develop an
19(h)-(j)). In addition, we observe that T-PARA works well improved version of Eq. (7):
when e = 0.4, 0.6 and 0.8 (see Fig. 18(h)-(j)), while the
performance of ONE-PARA is not good (Fig. 16). Moreover, j X(2(Bj - E(Bm))2 + y2(Di - E(Dm))2 + z2(Ui - E(Um))2
Fig. 18(b) and (g) as well as Fig. 19(b) and (g) show the impact ST(T,j) = 1--------i--------:----'-.-------------:----------:-----4---------------,
of e when it is too small. Furthermore, it is worth mentioning xBiE(Bm) + yDiE(Um) + zUi E(Um)
that T-PARA performs well (see Fig. 18(h)-(j) as well as Fig. (8)
19(h)-(j)) in terms of both ADV _Homo increasing T attack and
ADV _Homo decreasing T attack. Therefore, it is resilient to where xB + yD + zU = 1.
ADV_Hbd. We introduce three weighted factors x, y and z into Eq. (7),
enabling a T-PARA-WF method that can be adjusted depending
on different scenarios. For example, to prevent ADV from
increasing trustworthiness, we can define a
TABLE 1
Impacts of Consensus and Threshold Functions with Respect to d(Bij, E (Bmj )), d(Dij,E(Dmj )) and d(Uij, E(Umj ))
Threshold Function
d(B^,B(B^)) dtD^Etp^Y) d(Ul,E(U^) TC-ONLY ONE-PARA T-PARA T-PARA-WF
(Eq. (6)) (Eq. (7)) (Eq. (8))
«0 «0 RS 0 good good good good
«0 E(cD) > E(fD) good good good good
high -
S3 0 E(cD) C E(fD) - not enough not enough good good
E(cB) ; > E(fB) - - not enough good good good
high
E(cB) ; E(fB) - - not enough good good good
REN ET AL.: NOVEL APPROACH TO TRUST MANAGEMENT 1421
Fig. 16. Example of ONE-PARA does not work, when cT = {0.1,0.1,0.8}, fT = {0. 1,0.8, 0.1}, oc = of = 0.01.
Fig. 17. Example of ONE-PARA works even it cannot identity the difference between cT = {0.1,0.8, 0. 1} and fT = {0. 1,0.1,0.8}, oc = of = 0.01.
Fig. 18. Example of T-PARA works while TC-ONLY and ONE-PARA does not work well where cT = {0.1,0.1,0.8}, fT = {0.1,0.8, 0.1}, oc = of = 0.01.
higher value of B in Eq. (8), i.e., increase x. In contrast, we • In contrast, if ADV _Homo wants to decrease Y, ONE-
define a lower value for y to prevent ADV from decreasing PARA in terms of D is better than T-PARA since D is the
trustworthiness. To prevent ADV _Hbd (i.e., ADV generates false only weight factor in it.
trust opinions in any way to manipulate sensor trust- • T-PARA is resilient to ADV _Noise, ADV _Homo and
worthiness), a larger value of z can be defined to put more ADV_Hbd.
weight on uncertainty U. • T-PARA-WF is a more flexible way to prevent ADV
Note that Eq. (6)andEq.(7) are special cases of Eq. (8) when x from various attacks. The selection of x, y and z is
= 1, y = z = 0andx = y = z = 1, respectively. Finally, we have the scenario dependent.
following observations. The countermeasures against ADV’s pollution attack strategies
are summarized in Table 2. Here, Fair and Good indicate
• If ADV_Homo intends to increase Y, ONE-PARA in
terms of B is better than T-PARA since B is the only
weight factor in it. That is, x = 1, y = z = 0, meaning that
D and U are not taken into consideration.
1422 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 7, JULY 2014
Fig. 19. Example of TC-ONLY works well while T-PARA slightly compromised the result when e is selected too small. cT = {0. 1,0.8, 0.1}, fT =
{0.1,0.1,0.8}, oc = of = 0.01.
how the countermeasures are resilient to ADV’s pollution attack supported in part by the Aiming for the Top University and
strategies. Good means that a countermeasure (e.g., ONE- Elite Research Center Development Plan by Taiwan, and this
PARA) is more resilient than TC-ONLY (i.e., Fair), once work was partially done while Y. Ren was visiting the School of
attacked by ADV _Noise. Information Sciences, University of Pittsburgh. Part of this
paper was presented at the IEEE MDM conference, July 2012.
8 CONCLUSION
In this paper, we have proposed a family of efficient and robust REFERENCES
trust management schemes for UWSNs based on Subjective [1] D. Ma, C. Soriente, and G. Tsudik, “New adversary and new threats:
Logic. Our advanced trust storage scheme, AS, facilitates Security in unattended sensor networks,” IEEE Netw., vol. 23, no. 2, pp.
distributed trust data storage to ensure high reliability of trust 43-48, Mar. 2009.
[2] Y. Ren, V. Oleshchuk, F. Y. Li, and S. Sulistyo, “SCARKER: A sensor
data. It takes the advantage of both GHT and GPSR routing to capture resistance and key refreshing scheme for mobile WSNs,” in
find storage nodes and to route trust data. We have also Proc. IEEE LCN, Bonn, Germany, 2011.
proposed several methods to mitigate trust pollution attacks [3] R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik,
based on various trust similarity measures. We demonstrated “Catch me (if you can): Data survival in unattended sensor networks,” in
Proc. IEEE PERCOM, Hong Kong, 2008.
that our trust management schemes are resilient to major attack
[4] R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, “United we stand:
categories including ADV _Del, ADV _Noise, ADV_Homo, and Intrusion-resilience in mobile unattended WSNs,” IEEE Trans. Mobile
ADV _Hbd. Moreover, our simulation results demonstrated that Comput., vol. 12, no. 7, pp. 1456-1468, Jul. 2013.
AS has much lower storage costs compared with the less [5] R. Di Pietro and N. Verde, “Epidemic data survivability in unattended
sophisticated approaches. Combining AS with similarity wireless sensor networks,” in Proc. ACM WiSec, Hamburg, Germany,
2011.
threshold measures, we are able to significantly reduce trust [6] K.-S. Hung, K.-S. Lui, and Y.-K. Kwok, “A trust-based geographical
storage costs and perform efficient node invalidation and routing scheme in sensor networks,” in Proc. IEEE WCNC, Kowloon,
mitigation of ADV’s pollution attacks. Hong Kong, 2007.
[7] A. Rezgui and M. Eltoweissy, “TARP: A trust-aware routing protocol for
sensor-actuator networks,” in Proc. IEEE MASS, Pisa, Italy, 2007.
ACKNOWLEDGMENTS [8] Y. Ren, V. Oleshchuk, and F. Li, “Optimized secure and reliable
The research leading to these results has received funding from distributed data storage scheme and performance evaluation in
unattended WSNs,” Comput. Commun., vol. 36, no. 9, pp. 1067-1077,
the EU FP7-PEOPLE-IRSES program under grant agreement May 2013.
247083, project acronym S2EuNet. V. Zadorozhny’s research [9] N. Lewis and N. Foukia, “Using trust in key distribution in wireless sensor
was supported in part by the Research Council of Norway networks,” in Proc. GLOBECOM Workshops, Washington, DC, USA,
through the L. Eiriksson mobility program, project 209237. Y. 2007.
[10] S. Ratnasamy et al., “GHT: A geographic hash table for data- centric
Ren’s research was
storage,” in Proc. ACM WSNA, 2002.
[11] M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, and Y. Hu,
“TIBFIT: Trust index based fault tolerance for arbitrary data faults in
TABLE 2 sensor networks,” in Proc. DSN, 2005.
ADV’s Pollution Attack Strategies and Their Countermeasures [12] S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based
Countermeasures framework for high integrity sensor networks,” ACM Trans. Sen. Netw.,
yWV's strategy TC-ONLY ONE-PARA T-PARA T-PARA-WF vol. 4, no. 3, pp. 1-37, May 2008.
AT>V_Noise Fair Good Good Good [13] K. Yadav and A. Srinivasan, “iTrust: An integrated trust framework for
ADV_Homo: wireless sensor networks,” in Proc. ACM SAC, New York, NY, USA,
increase T No Good Fair Good 2010.
ADV_Homo: [14] S. Buchegger and J. Le Boudec, “A robust reputation system for mobile
decrease T No Good Fair Good ad-hoc networks,” in Proc. P2PEcon, 2004.
AT>V_Hbd No No Good Good
[15] Y. L. Sun, W. Yu, Z. Han, and K. Liu, “Information theoretic framework
of trust modeling and evaluation for ad hoc networks,” IEEE J. Sel.
Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
REN ET AL.: NOVEL APPROACH TO TRUST MANAGEMENT 1423
[16] M. Raya, P. Papadimitratos, V. Gligor, and J.-P. Hubaux, “On data- 1993. He is an Associate Professor in the School
centric trust establishment in ephemeral ad hoc networks,” in Proc. IEEE of Information Sciences, University of Pittsburgh.
INFOCOM, Phoenix, AZ, USA, 2008. Before coming to United States, he was a
[17] M. Omar, Y. Challal, and A. Bouabdallah, “Reliable and fully distributed Principal Research Fellow in the Institute of
trust model for mobile ad hoc networks,” Comput. Secur., vol. 28, no. 3- System Programming, Russian Academy of
4, pp. 199-214, May 2009. Sciences. Since May 1998, he has been working
[18] L. Xiong and L. Liu, “PeerTrust: Supporting reputation-based trust for as a Research Associate at the Institute for
peer-to-peer electronic communities,” IEEE Trans. Knowl. Data Eng., Advanced Computer Studies, University of
vol. 16, no. 7, pp. 843-857, Jul. 2004. Maryland, College Park. He joined the University
[19] R. Zhou and K. Hwang, “PowerTrust: A robust and scalable reputation of Pittsburgh in September 2001, where he is the
system for trusted peer-to-peer computing,” IEEE Trans. Parallel head of the Network Aware Data Management
Distribut. Syst., vol. 18, no. 4, pp. 460-473, Apr. 2007. Group and a member of the Advanced Data
[20] K. Walsh and E. G. Sirer, “Experience with an object reputation system Management Technologies Laboratory. His research interests include
for peer-to-peer filesharing,” in Proc. USENIX NSDI, Berkeley, CA, networked information systems, complex adaptive systems, WSN data
USA, 2006. management, query optimization in resource constrained distributed
[21] D. Ma and G. Tsudik, “DISH: Distributed self-healing,” in Proc. Int.
environments, and scalable architectures for wide-area environments
Symp. SSS, Detroit, MI, USA, 2008.
with heterogeneous information servers. He received the Best Paper
[22] Y. Ren, V. Oleshchuk, and F. Y. Li, “Secure and efficient data storage in
Award in IEEE MDM 2012. He is a senior member of the IEEE.
unattended wireless sensor networks,” in Proc. IFIP Int. Conf. NTMS,
Cairo, Egypt, 2009.
[23] Y. Ren, V. I. Zadorozhny, V. Oleshchuk, and F. Y. Li, “An efficient,
Vladimir A. Oleshchuk is Professor of Computer Science at the
robust and scalable trust management scheme for unattended wireless
University of Agder, Norway. He received his Ph.D. degree in Computer
sensor networks,” in Proc. IEEE MDM, Bengaluru, India, 2012.
Science (1988) from the Taras Shevchenko Kiev
[24] M. Probst and S. Kasera, “Statistical trust establishment in wireless
sensor networks,” in Proc. ICPADS, Hsinchu, Taiwan, 2007. State University, Kiev, Ukraine. He is a senior
[25] S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin, “Data- member of the IEEE and a senior member of the
centric storage in sensornets,” ACM SIGCOMM Comput. Commun. Rev., ACM. His current research interests include
vol. 33, no. 1, pp. 137-142, 2003. formal methods and information security, privacy
[26] M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadeem, “Adaptation and trust with special focus on
of reputation management systems to dynamic network conditions in ad telecommunication systems. He received the
hoc networks,” IEEE Trans. Comput., vol. 59, no. 5, pp. 707-719, May Best Paper Award in IEEE MDM 2012.
2010.
[27] A. Becher, Z. Benenson, and M. Dornseif, “Tampering with motes: Real-
world physical attacks on wireless sensor networks,” in Proc. Int. Conf. Frank Y. Li (S’99, M’03, SM’09) holds a Ph.D.
SPC, York, U.K., 2006. degree from the Norwegian University of Science
[28] S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, “Location- and Technology (NTNU). He worked as a Senior
centric isolation of misbehavior and trust routing in energy-constrained Researcher at UniK - University Graduate
sensor networks,” in Proc. IEEE IPCCC, 2004. Center, University of Oslo, before joining the
[29] G. Theodorakopoulos and J. Baras, “On trust models and trust evaluation Department of Information and Communication
metrics for ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 24, no. Technology, University of Agder (UiA) in August
2, pp. 318-328, Feb. 2006. 2007 where he is currently a Professor. During
[30] A. Josang, “An algebra for assessing trust in certification chains,” in the past few years, he has been an active par-
Proc. NDSS, San Diego, CA, USA, 1999. ticipant in several Norwegian and EU FP6/FP7
[31] K. Pelechrinis, V. Zadorozhny, and V. Oleshchuk, “Collaborative research projects. He is listed as a Lead
assessment of information provider’s reliability and expertise using Scientist by the European Commission DG RTD
subjective logic,” in Proc. CollaborateCom, Orlando, FL, USA, 2011. Unit A.03 - Evaluation and Monitoring of
[32] V. Oleshchuk and V. Zadorozhny, “Trust-aware query processing in data Programmes in Nov. 2007. Dr. Li’s research
intensive sensor networks,” in Proc. Int. Conf. SensorComm, Valencia, interest includes 3G/4G and beyond mobile systems and wireless
Spain, 2007. networks, mesh and ad hoc networks; wireless sensor network; Device-
[33] K. Pelechrinis, V. Zadorozhny, and V. Oleshchuk, “A cognitivebased to-Device (D2D) communication; cooperative communications;
scheme for user reliability and expertise assessment in Q&A social cognitive radio networks; green wireless communications; QoS,
networks,” in Proc. IEEE Conf. IRI, Las Vegas, NV, USA, 2011. resource management and traffic engineering in wired and wireless IP-
[34] D. Liu and P. Ning, “Multilevel ^TESLA: Broadcast authentication for based networks; analysis, simulation and performance evaluation of
distributed sensor networks,” ACM Trans. Embed. Comput. Syst., vol. 3, communication protocols and networks. He received the Best Paper
no. 4, pp. 800-836, Nov. 2004. Award in IEEE MDM 2012. He is a senior member of the IEEE.
[35] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for
wireless networks,” in Proc. ACM MobiCom, 2000. ■ For more information on this or any other computing topic,
Vladimir I. Zadorozhny received the Ph.D. degree from the Institute for please visit our Digital Library at www.computer.org/publications/dlib.
Problems of Informatics, Russian Academy of Sciences, Moscow, in
Yi Ren is currently doing research as a postdoctoral researcher at National Chiao Tung University (NCTU), Taiwan. He
received his Ph.D. degree in Information Communication and Technology from the University of Agder (UiA), Norway, in
April 2012. His current research interests include security in wireless sensor networks, ad hoc, and mesh networks, LTE,
smart grid, and e-health security. He received the Best Paper Award in IEEE MDM 2012. He is a member of the IEEE.