CFP last date
16 December 2024
Reseach Article

SoTRMSim: Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks

by Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze, Griffith Selorm Klogo
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 16
Year of Publication: 2018
Authors: Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze, Griffith Selorm Klogo
10.5120/ijais2018451775

Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze, Griffith Selorm Klogo . SoTRMSim: Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks. International Journal of Applied Information Systems. 12, 16 ( October 2018), 1-4. DOI=10.5120/ijais2018451775

@article{ 10.5120/ijais2018451775,
author = { Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze, Griffith Selorm Klogo },
title = { SoTRMSim: Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks },
journal = { International Journal of Applied Information Systems },
issue_date = { October 2018 },
volume = { 12 },
number = { 16 },
month = { October },
year = { 2018 },
issn = { 2249-0868 },
pages = { 1-4 },
numpages = {9},
url = { https://www.ijais.org/archives/volume12/number16/1041-2018451775/ },
doi = { 10.5120/ijais2018451775 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:07:40.375355+05:30
%A Henry Nunoo-Mensah
%A Kwame Osei Boateng
%A James Dzisi Gadze
%A Griffith Selorm Klogo
%T SoTRMSim: Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 12
%N 16
%P 1-4
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The use of trust and reputation models (TRMs) are on the rise due to the increasing complexities of cryptography. The use of cryptography though potent on traditional networks, cannot be supported by the resource constraint wireless sensor network (WSN). Trust evaluations have made use of a number of approaches, such as analytical, bio- and socio-inspired methods, in the design of TRMs. The use of socio-inspired methods for TRM design is given less attention though its a simple and effective method. The paper proposes the first sociopsychological TRM simulator (SoTRMSim). The models implemented in SoTRMSim are the consensusaware and privacy-aware sociopsychological TRMs by Rathore and Nunoo-Mensah respectively. The proposed simulator provides an objective way of simultaneously evaluating sociopsychological TRMs.

References
  1. David W Carman, Peter S Kruus, and Brian J Matt. Constraints and approaches for distributed sensor network security (final). Technical Report 1, Trusted Information System, NAI Labs, 2000.
  2. F´elix G´omez M´armol, Javier G Mar´in-Bl´azquez, and Gregorio Mart´inez P´erez. Lftm, linguistic fuzzy trust mechanism for distributed networks. Concurrency and Computation: Practice and Experience, 24(17):2007–2027, 2012.
  3. Farruh Ishmanov, SungWon Kim, and Seung Yeob Nam. A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3):7040–7061, 2015.
  4. Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web, pages 640– 651. ACM, 2003.
  5. Lianggui Liu, Li Chen, and Huiling Jia. Social milieu oriented routing: a new dimension to enhance network security in wsns. Sensors, 16(2):247, 2016.
  6. F. G. Marmol and G. M. Perez. Trmsim-wsn, trust and reputation models simulator for wireless sensor networks. In 2009 IEEE International Conference on Communications, pages 1–5, June 2009.
  7. F´elix G´omez M´armol and Gregorio Mart´inez P´erez. Providing trust in wireless sensor networks using a bio-inspired technique. Telecommunication systems, 46(2):163–180, 2011.
  8. F´elix G´omez M´armol and Gregorio Mart´inez P´erez. Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3):934–941, 2012.
  9. Hosein Marzi and Mengdu Li. An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Computer Science, 19:1159–1166, 2013.
  10. Bartosz Musznicki and Piotr Zwierzykowski. Survey of simulators for wireless sensor networks. International Journal of Grid and Distributed Computing, 5(3):23–50, 2012.
  11. Henry Nunoo-Mensah. Privacy-aware sociopsychological trust and reputation model for wireless sensor networks, 2018.
  12. Henry Nunoo-Mensah, Kwame Osei Boateng, and James Dzisi Gadze. The adoption of socio- and bioinspired algorithms for trust models in wireless sensor networks: A survey. International Journal of Communication Systems, pages e3444–n/a, 2017. e3444 dac.3444.
  13. Heena Rathore, Venkataramana Badarla, and KJ George. Sociopsychological trust model for wireless sensor networks. Journal of Network and Computer Applications, 62:75–87, 2016.
  14. Heena Rathore and Sushmita Jha. Bio-inspired machine learning based wireless sensor network security. In Nature and Biologically Inspired Computing (NaBIC), 2013 World Congress on, pages 140–146, Fargo, ND, USA, 2013. IEEE.
  15. Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, and Zhiyong Feng. Dynamic trust evaluation of wireless sensor networks based on multi-factor. In Trustcom/ BigDataSE/ISPA, 2015 IEEE, volume 1, pages 33–40, Helsinki, Finland, 2015. IEEE.
  16. Ayman Tajeddine, Ayman Kayssi, Ali Chehab, Imad Elhajj, and Wassim Itani. Centera: a centralised trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors, 15(2):3299–3333, 2015.
  17. Vinod Kumar Verma. Pheromone and path length factorbased trustworthiness estimations in heterogeneous wireless sensor networks. IEEE Sensors Journal, 17(1):215– 220, 2017.
  18. Jian Wang, Shuai Jiang, and Abraham O Fapojuwo. A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors, 17(6):1227, 2017.
  19. Li Xiong and Ling Liu. Peertrust: Supporting reputationbased trust for peer-to-peer electronic communities. IEEE transactions on Knowledge and Data Engineering, 16(7):843–857, 2004.
  20. Mingchuan Zhang, Changqiao Xu, Jianfeng Guan, Ruijuan Zheng, Qingtao Wu, and Hongke Zhang. A novel bioinspired trusted routing protocol for mobile wireless sensor networks. TIIS, 8(1):74–90, 2014.
  21. Runfang Zhou and Kai Hwang. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on parallel and distributed systems, 18(4):460–473, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network security trust and reputation models sociopsychology simulator