Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022 Sep 27:2022:3449428.
doi: 10.1155/2022/3449428. eCollection 2022.

Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

Affiliations
Review

Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

Zhengxin Xia et al. Comput Intell Neurosci. .

Abstract

The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wireless sensor networks should have and the current security challenges faced by the network are discussed in detail, and the importance of security issues in wireless sensor networks is pointed out. Secondly, this paper studies and analyzes the current situation of wireless sensor network security problems including the internal and external attacks and the active and passive attacks. Thirdly, this paper also discusses the significance, concept, and characteristics of reputation and trust, the division and composition of reputation and trust system, and the common applications of the reputation and trust mechanism in wireless sensor networks.

PubMed Disclaimer

Conflict of interest statement

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Figures

Figure 1
Figure 1
Security objectives of WSNs.
Figure 2
Figure 2
WSN attacks.

References

    1. Lopez J., Roman R., Alcaraz C. Foundation of Security Analysis and Design V . Berlin, Germany: Springer; 2009. Analysis of security threats, requirement, technologies and standards in wireless sensor networks; pp. 289–228.
    1. Li J., Yu L., Zhao J., Luo C., Zheng J. TSTE: a time-variant stochastic trust evaluation model in social networks. KSII Transactions on Internet and Information Systems . 2017;11(6):3273–3308.
    1. Battat N., Makhoul A., Kheddouci H., Medjahed S., Aitouazzoug N. Ad-Hoc, Mobile, and Wireless Networks . Cham, Switzerland: Springer; 2017. Trust based monitoring approach for mobile ad hoc networks; pp. 55–62.
    1. Wu X. A robust and adaptive trust management system for guaranteeing the availability in the internet of things environments. KSII Transactions on Internet and Information Systems . 2018;12(5):2396–2413.
    1. Peng J., Zhou H., Meng Q., Yang J. Big data security access control algorithm based on memory index acceleration in WSNs. Journal on Wireless Communications and Networking . 2020;2020(1) doi: 10.1186/s13638-020-01725-1. - DOI