Review Article

Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

Table 1

Defending against internal attack capability with trust management technology.
(a)

Internal attacksTrust management schemes
ADCTANFIS-TMMATSNBDTMSBTMSBTRESCRITDFDIDFREDTMETMRMFANG

Bad-mouthing attack (slander attack)×-×
Ballot stuffing attack-×----××---×
Black hole attack-××--×--
Collusion attack-×++--×××-
Conflicting behavior attack×-××-×-××
Data forgery attack×-××-×-×
Denial of service attack×-××--×××
Garnished attack××××-×---×
Node replication attack×--×-××-×-
On-off attack×××××
Reputation time-varying attack××××--×----
Selective forwarding attack-×---
Selfish attack--××-××--×
Sinkhole attack×-×--×-×
Sleeper attack××××--××××--
Sybil attack×---××-××

Note: For ease of reference, the names of internal attacks and typical trust management techniques (abbreviations) in this table are arranged in ascending order of their initials. “√” indicates that the trust management scheme can defend against such internal attacks. “+” indicates that the trust management scheme can mitigate the harm of internal attacks or can only detect such internal attacks. “-” indicates that the defense ability of the trust management scheme against the internal attacks is unknown. “×” indicates that the trust management scheme cannot defend against the internal attacks.
(b)

Internal attacksTrust management schemes
GMM-BRSNGTMSHTCWHTMPHTMSISTMMJANANIKARTHIKKULDEEPLIU-CHENGLDTSLWTM

Bad-mouthing attack (slander attack)-×××-
Ballot stuffing attack--××-×-××××-
Black hole attack×-××-×-×
Collusion attack--××-××-×××
Conflicting behavior attack×××-×-×--×
Data forgery attack--××---××
Denial of service attack××--××--×
Garnished attack-××-××-××××
Node replication attack××××--××××
On-off attack-××-××-×××
Reputation time-varying attack××××××××××-×
Selective forwarding attack-××××
Selfish attack----××××---
Sinkhole attack×--×--××
Sleeper attack×--×××--×-××
Sybil attack×××××××

(c)

Internal attacksTrust management schemes
MdTMMMulti-agentNBBTEPLUSRARRMRASHMIReTrustRFSN (BRSN)SNTUATDDGTHI-CHAITMBBT

Bad-mouthing attack (slander attack)××××-
Ballot stuffing attack××---××--××
Black hole attack×---×-×--××-
Collusion attack×××--×××××-
Conflicting behavior attack×××××-×-×-
Data forgery attack×---×××--
Denial of service attack×××××-×-××-
Garnished attack××××--×-×
Node replication attack××-×××-×-×-
On-off attack×+×××-×
Reputation time-varying attack×××-××-----
Selective forwarding attack××-××---
Selfish attack××-×--×-××-
Sinkhole attack×-×××---×--
Sleeper attack×××--××--××
Sybil attack×××××××××--×

(d)

Internal attacksTrust management schemes
TMCEDTMMTP-BRSNTRTMSTRUST-DOETSRSTSTMTTSNTWSNYANGZEESHANZHOU

Bad-mouthing attack (slander attack)--×-
Ballot stuffing attack×-×-×××-×××
Black hole attack--××××-××
Collusion attack--×××××××
Conflicting behavior attack×-×××××-×-
Data forgery attack---×-×××-
Denial of service attack××××-×--×
Garnished attack××××××-×-×-
Node replication attack-×××××××-×
On-off attack--××××-
Reputation time-varying attack×-××××---×-
Selective forwarding attack×-×××××
Selfish attack×-××-××-×××
Sinkhole attack---×××××××
Sleeper attack---×××××××××
Sybil attack×××-××--×--