A Trust Model using Fuzzy Logic in Wireless Sensor Network

Adapting various sensor devices to communicate within sensor networks empowers us by providing range of possibilities. The sensors in sensor networks need to know their measurable belief of trust for efficient and safe communication. In this paper, we suggested a trust model using fuzzy logic in sensor network. Trust is an aggregation of consensus given a set of past interaction among sensors. We applied our suggested model to sensor networks in order to show how trust mechanisms are involved in communicating algorithm to choose the proper path from source to destination.




References:
[1] T. H. Hai, F. Khan, and E. Huh, "Hybrid Intrusion Detection System for
Wireless Sensor Networks", ICCSA 2007, LNCS 4706.
[2] Wood, A.D., Stankovic, J.A. "Denial of Service in Sensor Networks",
Computer 35(10), 2002.
[3] Karlof, C., Wagner, D. "Secure Routing in Wireless Sensor Networks:
Attacks and Countermeasures", Elsevier-s Ad. Hoc. Networks Journal,
Special issue on sensor network applications and protocols, 2003.
[4] Sini Ruohomaa and Lea Kutvonen, "Trust Management Survey", iTrust
2005, LNCS 3477, 2005.
[5] Marsh, S., "Formalising Trust as a Computational Concept. PhD thesis",
University of Stirling, Department of Computer Science and Mathematics,
1994.
[6] Mayer, R.C., Davis, J.H., "An integrative model of organizational trust:,
The Academy of Management Review 20, 1995.
[7] Essin, D.J., "Patterns of trust and policy", Proceedings of 1997 New
Security Paradigms Workshop, ACM Press 1997.
[8] Egger, F.N., "Trust me, I-m an online vendor: Towards a model of trust
for e-Commerce system design", Conference on Human Factors in
Computing Systems, ACM Press, 2000.
[9] Egger, F.N., "From Interactions to Transactions: Designing the Trust
Experience for Business-to-Consumer Electronic Commerce", PhD
thesis, Eindhoven University of Technology, 2003.
[10] Mui, L., Mohtashemi, M., Halberstadt, A., "A computational model of
trust and reputation", 35th Annual Hawaii International Conference on
System Sciences (HICSS-02). Volume 7., IEEE Computer Society, 2002.
[11] Liu, J., Issarny, V., "Enhanced reputation mechanism for mobile ad hoc
networks", Trust Management: Second International Conference, iTrust
2004, Oxford, UK, March 29-April 1, 2004. Proceedings. Volume LNCS
2995, 2004.
[12] Wagealla, W., Carbone, M., English, C., Terzis, S., Nixon, P., "A formal
model on trust lifecycle management", Workshop on Formal Aspects of
Security and Trust (FAST2003) at FM2003. Volume IIT TR-10/2003.
IIT-CNR, Italy, 2003.
[13] Cahill, V., et al., "Using trust for secure collaboration in uncertain
environments", Pervasive Computing 2, 2003.
[14] Grandison, T., Sloman, M., "Specifying and analysing trust for Internet
applications", Proceedings of 2nd IFIP Conference on e-Commerce,
e-Business, e-Government I3e2002, Lisbon, Portugal, 2002.
[15] Grandison, T.W.A., Sloman, M., "Sultan - a language for trust
specification and analysis", Eighth Workshop of the HP OpenView
University Association, Berlin, June 24-27, 2001.
[16] English, C., Terzis, S., Wagealla, W., "Engineering trust based
collaborations in a global computing environment", Trust Management:
Second International Conference, iTrust 2004, LNCS 2995, 2004.
[17] Morgado de Gois, J. A., Germann, D., Hiller, M.,"Sensor-based ground
detection in unstructured terrain for the walking machine ALDURO", 6th
Conference on Climbing and Walking Robots CLAWAR 2003.
[18] Stephen Marsh and Mark R. Dibben, "Trust, Untrust, Distrust and
Mistrust - An Exploration of the Dark(er) side", iTrust 2005, LNCS 3477,
2005.