Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 7623742, 15 pages
https://doi.org/10.1155/2017/7623742
Research Article

Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks

1Dipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, Italy
2Department of Electrical and Information Engineering, Politecnico di Bari, Via Orabona 4, 70125 Bari, Italy

Correspondence should be addressed to Luigi Alfredo Grieco

Received 9 June 2017; Revised 19 September 2017; Accepted 4 October 2017; Published 28 November 2017

Academic Editor: Pierre-Martin Tardif

Copyright © 2017 Sabrina Sicari et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. F. G. Mármol and G. M. Pérez, “Security threats scenarios in trust, reputation models for distributed systems,” Computers & Security, vol. 28, no. 7, pp. 545–556, 2009. View at Google Scholar
  3. M. Xie, S. Han, B. Tian, and S. Parvin, “Anomaly detection in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1302–1325, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266–282, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “GoNe: Dealing with node behavior,” in Proceedings of the 5th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2015, pp. 358–362, Berlin, Germany, September 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. T. Kohonen, “The Self-Organizing Map,” Proceedings of the IEEE, vol. 78, no. 9, pp. 1464–1480, 1990. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. Bankovic, D. Fraga, J. Manuel Moya et al., “Improving security in WMNs with reputation systems and self-organizing maps,” Journal of Network and Computer Applications, vol. 34, no. 2, pp. 455–463, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient aggregation of encrypted data in wireless sensor networks,” in Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pp. 109–117, IEEE Computer Society, July 2005. View at Publisher · View at Google Scholar
  9. K. Lauter, “The Advantages of Elliptic Curve Cryptography for Wireless Security,” IEEE Wireless Communications Magazine, vol. 11, no. 1, pp. 62–67, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Sicari, L. A. Grieco, A. Rizzardi, G. Boggia, and A. Coen-Porisini, “SETA: a secure sharing of tasks in clustered wireless sensor networks,” in Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, pp. 239–246, Lyon, France, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Ekici, S. Vural, J. McNair, and D. Al-Abri, “Secure probabilistic location verification in randomly deployed wireless sensor networks,” Ad Hoc Networks, vol. 6, no. 2, pp. 195–209, 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Coen-Porisini and S. Sicari, “Improving data quality using a cross layer protocol in wireless sensor networks,” Computer Networks, vol. 56, no. 17, pp. 3655–3665, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. M. K. Domenic, Y. Wang, F. Zhang, I. Memon, and Y. H. Gustav, “Preserving users' privacy for continuous query services in road networks,” in Proceedings of the 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering, ICIII 2013, pp. 352–355, China, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. I. Memon, I. Hussain, R. Akhtar, and G. Chen, “Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme,” Wireless Personal Communications, vol. 84, no. 2, pp. 1487–1508, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Mitchell and I.-R. Chen, “A survey of intrusion detection in wireless network applications,” Computer Communications, vol. 42, pp. 1–23, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. G. Han, J. Jiang, L. Shu, J. Niu, and H. Chao, “Management and applications of trust in Wireless Sensor Networks: a survey,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 602–617, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. B. Zhang, Z. H. Huang, and Y. Xiang, “A novel multiple-level trust management framework for wireless sensor networks,” Computer Networks, vol. 72, pp. 45–61, 2014. View at Publisher · View at Google Scholar
  18. W. Fang, C. Zhang, Z. Shi, Q. Zhao, and L. Shan, “BTRES: beta-based Trust and Reputation Evaluation System for wireless sensor networks,” Journal of Network and Computer Applications, vol. 59, pp. 88–94, 2016. View at Publisher · View at Google Scholar
  19. F. G. Mármol and G. M. Pérez, “Towards pre-standardization of trust, reputation models for distributed, heterogeneous systems,” Computer Standards and Interfaces, vol. 32, no. 4, pp. 185–196, 2010. View at Google Scholar
  20. F. G. Mármol, J. Girao, and G. M. Pérez, “TRIMS, a privacy-aware trust and reputation model for identity management systems,” Computer Networks, vol. 54, no. 16, pp. 2899–2912, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. D. Jelenc, R. Hermoso, J. Sabater-Mir, and D. Trček, “Decision making matters: a better way to evaluate trust models,” Knowledge-Based Systems, vol. 52, pp. 147–164, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: attack analysis and countermeasures,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867–880, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Marzi and M. Li, “An enhanced bio-inspired trust and reputation model for wireless sensor network,” Procedia Computer Science, vol. 19, pp. 1159–1166, 2013, Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies. View at Publisher · View at Google Scholar
  24. Z. Banković, D. Fraga, J. M. Moya et al., “Bio-inspired enhancement of reputation systems for intelligent environments,” Information Sciences, vol. 222, pp. 99–112, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Shamshirband, N. B. Anuar, M. L. M. Kiah, and A. Patel, “An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique,” Engineering Applications of Artificial Intelligence, vol. 26, no. 9, pp. 2105–2127, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Kumarage, I. Khalil, Z. Tari, and A. Zomaya, “Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling,” Journal of Parallel and Distributed Computing, vol. 73, no. 6, pp. 790–806, 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Shamshirband, A. Patel, N. B. Anuar, M. L. M. Kiah, and A. Abraham, “Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks,” Engineering Applications of Artificial Intelligence, vol. 32, pp. 228–241, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Shamshirband, N. B. Anuar, M. L. M. Kiah et al., “Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks,” Journal of Network and Computer Applications, vol. 42, pp. 102–117, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Akram and T. H. Cho, “Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks,” Ad Hoc Networks, vol. 47, pp. 16–25, 2016. View at Publisher · View at Google Scholar · View at Scopus
  30. H. Jadidoleslamy, M. R. Aref, and H. Bahramgiri, “A fuzzy fully distributed trust management system in wireless sensor networks,” AEÜ - International Journal of Electronics and Communications, vol. 70, no. 1, pp. 40–49, 2016. View at Publisher · View at Google Scholar · View at Scopus
  31. Z. Yu and J. J. P. Tsai, “A framework of machine learning based intrusion detection for wireless sensor networks,” in Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008, pp. 272–279, Taichung, Taiwan, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. Z. Banković, J. M. Moya, Á. Araujo, D. Fraga, J. C. Vallejo, and J.-M. De Goyeneche, “Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps,” Integrated Computer-Aided Engineering, vol. 17, no. 2, pp. 87–102, 2010. View at Publisher · View at Google Scholar · View at Scopus
  33. A. H. FathiNavid and A. B. Aghababa, “A protocol for intrusion detection based on learning automata in forwarding packets for distributed wireless sensor networks,” in Proceedings of the 4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012, pp. 373–380, Sanya, China, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  34. H. H. Soliman, N. A. Hikal, and N. A. Sakr, “A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks,” Egyptian Informatics Journal, vol. 13, no. 3, pp. 225–238, 2012. View at Publisher · View at Google Scholar · View at Scopus
  35. I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, vol. 47, no. 4, pp. 445–487, 2005. View at Publisher · View at Google Scholar · View at Scopus
  36. M. Passing and F. Dressler, “Experimental performance evaluation of cryptographic algorithms on sensor nodes,” in Proceedings of the 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, MASS, pp. 882–887, can, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  37. S. Md Zin, N. Badrul Anuar, M. Laiha Mat Kiah, and A.-S. Khan Pathan, “Routing protocol design for secure WSN: review and open research issues,” Journal of Network and Computer Applications, vol. 41, no. 1, pp. 517–530, 2014. View at Publisher · View at Google Scholar · View at Scopus
  38. R. Di Pietro, S. Guarino, N. V. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks - A survey,” Computer Communications, vol. 51, pp. 1–20, 2014. View at Publisher · View at Google Scholar · View at Scopus
  39. D. Chaum and E. van Heyst, “Group Signatures,” in Proceedings of the 10th Annual International Conference on Theory, Application of Cryptographic Techniques, vol. 547 of Lecture Notes in Computer Science, pp. 257–265, Springer, Berlin, Heidelberg, 1991. View at Publisher · View at Google Scholar
  40. J. Camenisch and M. Stadler, Efficient group signature schemes for large groups, Advances in Cryptology, CRYPTO '97, 1294, 410-424, 1997.
  41. N. Basilico, N. Gatti, M. Monga, and S. Sicari, “Security games for node localization through verifiable multilateration,” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 1, pp. 72–85, 2014. View at Publisher · View at Google Scholar · View at Scopus
  42. K. Gomez, R. Riggio, T. Rasheed, D. Miorandi, and F. Granelli, “Energino: a hardware and software solution for energy consumption monitoring,” in Proceedings of the 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2012, pp. 311–317, May 2012. View at Scopus
  43. Omnet++ Simulator - Official Website, 2016, http://www.omnetpp.org/.
  44. J. Hui and P. Thubert, Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks, 2011, Sep., IETF RFC 6282.
  45. M. R. Palattella, N. Accettura, X. Vilajosana et al., “Standardized protocol stack for the internet of (important) things,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1389–1406, 2013. View at Publisher · View at Google Scholar · View at Scopus
  46. N. Mohamed, I. Jawhar, J. Al-Jaroodi, and L. Zhang, “Sensor network architectures for monitoring underwater pipelines,” Sensors, vol. 11, no. 11, pp. 10738–10764, 2011. View at Publisher · View at Google Scholar · View at Scopus