Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
Table 1
Defending against internal attack capability with trust management technology.
(a)
Internal attacks
Trust management schemes
ADCT
ANFIS-TMM
ATSN
BDTMS
BTMS
BTRES
CRIT
DFDI
DFR
EDTM
ETMRM
FANG
Bad-mouthing attack (slander attack)
√
√
√
√
√
√
√
√
×
√
-
×
Ballot stuffing attack
-
×
-
-
-
-
×
×
-
-
-
×
Black hole attack
√
√
-
×
×
-
-
√
×
-
√
-
Collusion attack
√
√
-
×
+
+
-
-
×
×
×
-
Conflicting behavior attack
×
-
√
×
×
-
√
√
×
-
×
×
Data forgery attack
×
-
×
×
-
√
×
√
√
√
-
×
Denial of service attack
×
-
×
×
-
√
-
√
×
√
×
×
Garnished attack
×
×
×
√
×
-
×
-
-
-
×
√
Node replication attack
×
-
-
√
×
-
×
√
×
-
×
-
On-off attack
×
×
√
√
×
√
√
√
×
√
×
√
Reputation time-varying attack
×
×
×
√
×
-
-
×
-
-
-
-
Selective forwarding attack
√
√
-
×
√
√
-
√
√
√
-
-
Selfish attack
-
-
×
×
√
-
×
×
-
-
√
×
Sinkhole attack
×
√
-
×
√
-
-
√
×
-
√
×
Sleeper attack
×
×
×
×
-
-
×
×
×
×
-
-
Sybil attack
×
√
-
-
√
-
×
√
×
-
×
×
Note: For ease of reference, the names of internal attacks and typical trust management techniques (abbreviations) in this table are arranged in ascending order of their initials. “√” indicates that the trust management scheme can defend against such internal attacks. “+” indicates that the trust management scheme can mitigate the harm of internal attacks or can only detect such internal attacks. “-” indicates that the defense ability of the trust management scheme against the internal attacks is unknown. “×” indicates that the trust management scheme cannot defend against the internal attacks.