Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks
- PMID: 36203716
- PMCID: PMC9532060
- DOI: 10.1155/2022/3449428
Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks
Abstract
The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wireless sensor networks should have and the current security challenges faced by the network are discussed in detail, and the importance of security issues in wireless sensor networks is pointed out. Secondly, this paper studies and analyzes the current situation of wireless sensor network security problems including the internal and external attacks and the active and passive attacks. Thirdly, this paper also discusses the significance, concept, and characteristics of reputation and trust, the division and composition of reputation and trust system, and the common applications of the reputation and trust mechanism in wireless sensor networks.
Copyright © 2022 Zhengxin Xia et al.
Conflict of interest statement
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Figures
References
-
- Lopez J., Roman R., Alcaraz C. Foundation of Security Analysis and Design V . Berlin, Germany: Springer; 2009. Analysis of security threats, requirement, technologies and standards in wireless sensor networks; pp. 289–228.
-
- Li J., Yu L., Zhao J., Luo C., Zheng J. TSTE: a time-variant stochastic trust evaluation model in social networks. KSII Transactions on Internet and Information Systems . 2017;11(6):3273–3308.
-
- Battat N., Makhoul A., Kheddouci H., Medjahed S., Aitouazzoug N. Ad-Hoc, Mobile, and Wireless Networks . Cham, Switzerland: Springer; 2017. Trust based monitoring approach for mobile ad hoc networks; pp. 55–62.
-
- Wu X. A robust and adaptive trust management system for guaranteeing the availability in the internet of things environments. KSII Transactions on Internet and Information Systems . 2018;12(5):2396–2413.
-
- Peng J., Zhou H., Meng Q., Yang J. Big data security access control algorithm based on memory index acceleration in WSNs. Journal on Wireless Communications and Networking . 2020;2020(1) doi: 10.1186/s13638-020-01725-1. - DOI
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Research Materials