this case, neighbour cannot detect any changes
because they do not have the ability to distinguish
the real message sender.
Replication Attack: An adversary tries to replay
old messages. A replicated message will be well
detected by our model through nonce that will be
checked at every message transfer to ensure the
freshness of the data.
Collusion Attack: On detecting of untransfered
message the trust decreases.
A comparison is presented in the table below
based on a study made by (Han et al., 2014) to
compare our model with some existing models in the
literature
.
Table 2: Comparison between models.
5 CONCLUSIONS
From experiment described above, we can clearly
conclude that our proposed model LTMHL
(Lightweight Trust Model with High Longevity) is
lightweight in terms of energy, and is reliable, robust
and resist against most of the attacks threatening
wireless sensor networks. In our model, every
malicious event leads to a minimization of the
confidence value nodes whatever that is caused by
transmission error or by a malicious behaviour.
However, LTMHL cannot detect an information
attack. In future work, we will seek to integrate the
trust information in the trust model. To minimize the
amount of energy consumed by the trust data, we
will seek to integrate the cloud.
REFERENCES
Anderson, R., and Kuhn, M., 1996. Tamper resistance
cautionary note. In Proceedings of the 2nd USENIX
Workshop on Electronic Commerce, USENIX.
Boutaba, R., Marshall, A., ,2006. Management in peer-to-
peer systems: Trust, reputation and security. Computer
Networks, Elsevier.
Cheikhrouhou, O., 2015. Secure Group Communicati-on
in Wireless Sensor Networks:A survey. In Journal of
Network and Computer Applications, Elsevier.
Chen, H., Wu, H., Zhou, X., and Gao, C., 2007. Agent-
based Trust Model in Wireless Sensor Networks. In
Eighth ACIS International Conference on Software
Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, IEEE.
Deng, H., Sun, X., Wang, B., and Cao, Y., 2009. Selective
Forwarding Attack Detection using Water markin
WSNs”. In International Colloquium on Computing,
Communication, Control, and Management, IEEE.
Feng, R., Xu, X., Zhou, X., and Wan, J., 2011. ATrust
Evaluation Algorithm for Wireless Sensor Networks
Based on Node Behaviorsand D-S Evidence Theory.
In sensores, MDPI.
Ganeriwal, S., Balzanoand, L., Srivastava, M., 2004.
Reputation-based Frame work for High Integrity
Sensor Networks. In Proceedings of the2nd ACM
workshop on Security of adhoc and wsn, ACM.
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H., 2014.
Management and applications of trust in Wireless
Sensor Networks: A survey. In Journal of Computer
and System Sciences, Elsevier.
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.,
2000. In Energy-efficient communication protocol for
wireless microsensor networks. Proceedings of the
33rd annual Hawaii international conference, IEEE .
Hur, J., Lee, Y., Yoon, H., Choiand, D., and Jin, S., 2005.
Trust Evaluation Model for Wireless Sensor
Networks. In The 7
th
International Conference on
Advanced Communication Technology, IEEE.
Josang, A., and Ismail, R., 2002. The Beta Reputation
System. In The 15th Bled Electronic Commerce
Conference.
Momani, M., and Challa, S., 2010. Trust models in
wireless sensor networks: a survey. In Recent Trends
in Network Security and Applications, Springer.
Na, W., and Liping, G., and Chunxue, W., 2014. A Light-
Weighted Data Trust Model in WSN. In International
Journal of Grid & Distributed Computing.
Ozdemir, S. 2008. Functional reputation based reliable
data aggregation and transmission for wireless sensor
networks. In Computer Engineering Department, Gazi
University, Turkey, Elsevier.
Kumar, M., Alex, L., et al., 2014. A Hybrid Trust Based
Secure Model for Wirless Sensor. In International
Journal of Technology in Computer Science.
Yao, Z., Kimand, D., Doh, Y., 2008. PLUS: Paramet-
erized and Localized trust management Scheme for
sensor network ssecurity. In International Conference
on Mobile Adhoc and Sensor Systems, IEEE.
Yoon, H., Occena, L., 2015. Influencing factors of trust in
consumer-to-consumer electronic commerce with
gender and age. In International Journal of
Information Management, Elsevier.