Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them
Abstract
:1. Introduction
2. Previous Works
3. Trust Model Concepts
3.1. Environments
- Homogeneous: a network where all nodes are identical—same function, device, rank, etc.
- Heterogeneous: a network where nodes are not all identical.
- Hierarchical/clustered: networks where some nodes have a higher rank than others. Often, the network is controlled by a base station, which is in command of lower-level nodes or in a clustered network cluster head. These cluster heads are each in command of their own cluster of edge nodes. It is usually the case that the higher ranked the node is, the more computing power and resources it has.
- Static: a network where nodes are neither leaving nor entering—e.g., a smart factory sensor network usually has the same sensors all the time. Note: sometimes static can be referred to in terms of the nodes’ physical positioning. In this paper, static refers to the above definition unless explicitly stated otherwise.
- Dynamic: a network where nodes are entering and leaving the network, e.g., a mobile network or VANETs. Note: sometimes dynamic can be referred to in terms of the nodes’ physical positioning. In this paper, dynamic refers to the above definition unless explicitly stated otherwise.
3.2. Security Features
3.3. Trust Model Structure
4. Attack Types
4.1. Access Attacks
4.2. Reputation Attacks
4.3. Payload/Active Attacks
4.4. Denial of Service Attacks (DoS)
4.5. Routing Attacks
4.6. Physical Attacks
5. Trust Data Gathering
5.1. Data Gathering
5.2. Trust Parameters
- Ability—sensing and reasoning capabilities and influence on others.
- Benevolence—a measure of the trustor’s belief about how likely the trustee is to assist the trustor.
- Integrity—the perceived characteristics of predictability, consistency, honesty and reliability of the CPS.
- Reliability—the probability that the system will not fail.
- Availability—the probability that the system services are ready at a given time.
- Security—intrusion probability.
6. Trust Model and Calculation Techniques
6.1. Data Pre-Processing
6.2. Trust Aggregation
6.3. Majority Voting System
6.4. Probabilistic Models
6.5. Graph Models
6.6. Machine Learning Classification
6.7. Trust Ageing
6.8. Trust Thresholds
7. Model Design Recommendations
- MATLAB;
- NS-2;
- NetLogo;
- COOJA (run on Contiki OS).
8. Trust Model Design Case Study: Factory 4.0 vs. Agriculture 4.0
8.1. Network Environments
8.2. Trust Model Topology
8.3. Trust Parameters to Measure
9. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yousuf, M.; Kim, S. Coping with bad-mouthing in peer-to-peer file sharing networks. In Proceedings of the 2015 IEEE International Conference on Peer-to-Peer Computing (P2P), Boston, MA, USA, 21–25 September 2015; pp. 1–9. [Google Scholar] [CrossRef]
- Dragoni, N. A survey on trust-based web service provision approaches. In Proceedings of the 3rd International Conference on Dependability (DEPEND), ACM, Venice, Italy, 18–25 July 2010; pp. 83–91. [Google Scholar]
- Zhang, Z.; Zhu, H.; Luo, S.; Xin, Y.; Liu, X. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks. IEEE Access 2017, 5, 12088–12102. [Google Scholar] [CrossRef]
- Ting, H.; Kang, X.; Li, T.; Wang, H.; Chu, C. On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study. IEEE Access 2021, 9, 106743–106783. [Google Scholar] [CrossRef]
- Tangade, S.; Manvi, S. A survey on attacks, security and trust management solutions in VANETs. In Proceedings of the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 4–6 July 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Guo, J.; Chen, I. A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems. In Proceedings of the 2015 IEEE International Conference on Services Computing, New York City, NY, USA, 27 June 2015–2 July 2015; pp. 324–331. [Google Scholar] [CrossRef]
- Farrokhi, B.; Nalbandian, S. A Survey on Fuzzy Trust Management in Cloud Computing. In Proceedings of the 2018 1st International Conference on Advanced Research in Engineering Sciences (ARES), Dubai, United Arab Emirates, 15 June 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Wang, D.; Muller, T.; Liu, Y.; Zhang, J. Towards Robust and Effective Trust Management for Security: A Survey. In Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, 24–26 September 2014; pp. 511–518. [Google Scholar] [CrossRef]
- Kandah, F.; Cancelleri, J.; Reising, D.; Altarawneh, A.; Skjellum, A. A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019; pp. 1125–1134. [Google Scholar] [CrossRef]
- Mathas, C.; Vassilakis, C.; Kolokotronis, N. A Trust Management System for the IoT domain. In Proceedings of the 2020 IEEE World Congress on Services (SERVICES), Los Alamitos, CA, USA, 18–24 October 2020; pp. 183–188. [Google Scholar] [CrossRef]
- Wang, Y. Trust Quantification for Networked Cyber-Physical Systems. IEEE Internet Things J. 2018, 5, 2055–2070. [Google Scholar] [CrossRef]
- Meng, W.; Li, W.; Su, C.; Zhou, J.; Lu, R. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access 2018, 6, 7234–7243. [Google Scholar] [CrossRef]
- Rani, R.; Kumar, S.; Dohare, U. Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach. IEEE Internet Things J. 2019, 6, 8421–8432. [Google Scholar] [CrossRef]
- Boudagdigue, C.; Benslimane, A.; Kobbane, A.; Liu, J. Trust Management in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3667–3682. [Google Scholar] [CrossRef]
- Karmakar, G.; Das, R.; Kamruzzaman, J. IoT Sensor Numerical Data Trust Model Using Temporal Correlation. IEEE Internet Things J. 2020, 7, 2573–2581. [Google Scholar] [CrossRef]
- Adewuyi, A.; Cheng, H.; Shi, Q.; Cao, J.Á. MacDermott and X. Wang, “CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet Things J. 2019, 6, 5432–5445. [Google Scholar] [CrossRef] [Green Version]
- Wang, T.; Luo, H.; Jia, W.; Liu, A.; Xie, M. MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 16, 2054–2062. [Google Scholar] [CrossRef]
- Li, W.; Cao, J.; Hu, K.; Xu, J.; Buyya, R. A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments. IEEE Access 2019, 7, 34207–34226. [Google Scholar] [CrossRef]
- Truong, N.; Lee, G.; Um, T.; Mackay, M. Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2705–2719. [Google Scholar] [CrossRef] [Green Version]
- Ganeriwal, S.; Srivastava, M. Reputation-based Framework for High Integrity Sensor Networks. In Proceedings of the 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks, Washington, DC, USA, 25 October 2004. [Google Scholar]
- Srinivasan, A.; Teitelbaum, J.; Wu, J. DRBTS: Distributed Reputation-based Beacon Trust System. In Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC, Indianapolis, IN, USA, 29 September–1 October 2006. [Google Scholar]
- Li, X.; Zhou, F.; Du, J. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 924–935. [Google Scholar] [CrossRef]
- Han, G.; He, Y.; Jiang, J.; Wang, N.; Guizani, M.; Ansere, J. A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2019, 68, 11239–11247. [Google Scholar] [CrossRef]
- Reddy, V.B.; Venkataraman, S.; Negi, A. Communication and Data Trust for Wireless Sensor Networks Using D–S Theory. IEEE Sens. J. 2017, 17, 3921–3929. [Google Scholar] [CrossRef]
- Wu, X.; Huang, J.; Ling, J.; Shu, L. BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks. IEEE Access 2019, 7, 43679–43690. [Google Scholar] [CrossRef]
- Desai, S.; Nene, M. Multihop Trust Evaluation Using Memory Integrity in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4092–4100. [Google Scholar] [CrossRef]
- Pang, B.; Teng, Z.; Sun, H.; Du, C.; Li, M.; Zhu, W. A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network. IEEE Wirel. Commun. Lett. 2021, 10, 1613–1617. [Google Scholar] [CrossRef]
- Jiang, J.; Zhu, X.; Han, G.; Guizani, M.; Shu, L. A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2020, 69, 9031–9040. [Google Scholar] [CrossRef]
- Khan, T. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks. IEEE Access 2019, 7, 58221–58240. [Google Scholar] [CrossRef]
- Ahmad, F.; Kurugollu, F.; Kerrache, C.; Sezer, S.; Liu, L. NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles. IEEE Trans. Veh. Technol. 2021, 70, 9244–9257. [Google Scholar] [CrossRef]
- Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R.; Hussain, F. MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles. IEEE Internet Things J. 2020, 7, 3310–3322. [Google Scholar] [CrossRef] [Green Version]
- Xia, H.; Zhang, S.; Li, Y.; Pan, Z.; Peng, X.; Cheng, X. An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2019, 68, 7108–7120. [Google Scholar] [CrossRef]
- Keshavarz, M.; Gharib, M.; Afghah, F.; Ashdown, J. UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems. IEEE Access 2020, 8, 226074–226088. [Google Scholar] [CrossRef]
- Yu, Z.; Zhou, L.; Ma, Z.; El-Meligy, M. Trustworthiness Modeling and Analysis of Cyber-physical Manufacturing Systems. IEEE Access 2017, 5, 26076–26085. [Google Scholar] [CrossRef]
- Jeong, S.; Na, W.; Kim, J.; Cho, S. Internet of Things for Smart Manufacturing System: Trust Issues in Resource Allocation. IEEE Internet Things J. 2018, 5, 4418–4427. [Google Scholar] [CrossRef]
- Maimut, D.; Ouafi, K. Lightweight Cryptography for RFID Tags. IEEE Secur. Priv. 2012, 10, 76–79. [Google Scholar] [CrossRef]
- Latif, M.; Ahmad, M.; Khan, M. A Review on Key Management and Lightweight Cryptography for IoT. In Proceedings of the 2020 Global Conference on Wireless and Optical Technologies (GCWOT), Malaga, Spain, 6–8 October 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Chang, B.; Kuo, S. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs. IEEE Trans. Veh. Technol. 2009, 58, 1846–1863. [Google Scholar] [CrossRef]
- Tanabe, N.; Kohno, E.; Kakuda, Y. An Impersonation Attack Detection Method Using Bloom Filters and Dispersed Data Transmission for Wireless Sensor Networks. In Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Washington, DC, USA, 20–23 November 2012; pp. 767–770. [Google Scholar] [CrossRef]
- Chen, Z.; Guo, S.; Zheng, K.; Li, H. Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP. In Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, 25–26 April 2009; pp. 263–266. [Google Scholar] [CrossRef]
- Kannhavong, B.; Nakayama, H.; Nemoto, Y.; Kato, N.; Jamalipour, A. A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. Commun. 2007, 14, 85–91. [Google Scholar] [CrossRef]
- Kavitha, T.; Sridharan, D. Security Vulnerabilities In Wireless Sensor Networks: A Survey. J. Inf. Assur. Secur. 2010, 5, 31–44. [Google Scholar]
- Wang, C.; Feng, T.; Kim, J.; Wang, G.; Zhang, W. Catching Packet Droppers and Modifiers in Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 835–843. [Google Scholar] [CrossRef]
- Palo Alto Networks. What Is a Denial of Service Attack (DoS)? 2022. Available online: https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos (accessed on 8 January 2022).
- Hu, Y.; Perrig, A.; Johnson, D. Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 2006, 24, 370–380. [Google Scholar] [CrossRef]
- Mathur, A.; Newe, T.; Rao, M. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT. Sensors 2016, 16, 118. [Google Scholar] [CrossRef] [Green Version]
- Kibirige, G.; Sanga, C. A Survey on Detection of Sinkhole Attack in Wireless Sensor Network. arXiv 2022, arXiv:1505.01941. Available online: https://arxiv.org/abs/1505.01941 (accessed on 8 January 2022).
- Grover, K.; Lim, A.; Yang, Q. Jamming and anti-jamming techniques in wireless networks: A survey. Int. J. Ad Hoc Ubiquitous Comput. 2014, 17, 197. [Google Scholar] [CrossRef] [Green Version]
- Junejo, A.; Komninos, N.; Sathiyanarayanan, M.; Chowdhry, B. Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems. IEEE Trans. Emerg. Top. Comput. 2019, 9, 2030–2041. [Google Scholar] [CrossRef] [Green Version]
- Askham, N. The Six Primary Dimensions for Data Quality Assessment; DAMA UK Working Group: Bristol, UK, 2013; pp. 432–435. [Google Scholar]
- Lear, D.; Droms, R. Manufacturer Usage Description Specification. 2018. Available online: https://tools.ietf.org/html/draft-ietf-opsawg-mud-25 (accessed on 26 January 2022).
- Brilliant. Markov Chains|Brilliant Math & Science Wiki. 2022. Available online: https://brilliant.org/wiki/markov-chains/ (accessed on 30 January 2022).
- Liu, Y.; Ma, X.; Shu, L.; Hancke, G.; Abu-Mahfouz, A. From Industry 4.0 to Agriculture 4.0: Current Status, Enabling Technologies, and Research Challenges. IEEE Trans. Ind. Inform. 2021, 17, 4322–4334. [Google Scholar] [CrossRef]
Model | Network Type | Measured Parameters | Trust Ageing | Dynamic Threshold | |||
---|---|---|---|---|---|---|---|
Communications | Data | Interaction History | Resource Consumption | ||||
[3] | WSN | ✓ | ✓ | ✓ | ✓ | ||
[9] | IoT/CPS | ✓ | |||||
[10] | IoT/CPS | ✓ | |||||
[12] | WSN/IoT | ✓ | ✓ | ✓ | |||
[14] | IIoT | ✓ | ✓ | ||||
[15] | IoT | ✓ | |||||
[17] | IIoT | ✓ | ✓ | ||||
[19] | MCS | ✓ | ✓ | ||||
[20] | WSN | ✓ | ✓ | ✓ | |||
[22] | WSN | ✓ | |||||
[23] | UASN | ✓ | ✓ | ✓ | ✓ | ||
[24] | WSN | ✓ | ✓ | ||||
[25] | WSN | ✓ | ✓ | ✓ | ✓ | ||
[27] | WSN | ✓ | ✓ | ||||
[28] | Underwater WSN | ✓ | ✓ | ✓ | |||
[29] | WSN | ✓ | ✓ | ✓ | |||
[30] | VANET | ✓ | |||||
[31] | VANET | ✓ | ✓ | ✓ | |||
[32] | VANET | ✓ | ✓ | ✓ | |||
Usage Rate | 68.4% | 73.7% | 21% | 31% | 36.8% | 5.2% |
Attribute | Factory 4.0 | Agriculture 4.0 |
---|---|---|
Area | Generally, a smaller area physically than Agric 4.0, which can consist of larger physical areas but, due to access to more infrastructure, such as highspeed reliable comms., it is not affected as much by physical distance | Larger networks with little access to infrastructure. Sensors often exposed to harsh environments |
Communications | Use of wired and wireless protocols, such as PoE, WIFI, WIFI direct, Zigbee, etc. Generally, have access to reliable communications | Mostly using wireless communications. Often, long-range communications used, such as LoRa, 5G or radio |
Power | Access to power sources due to nodes’ proximity to infrastructure | Little access to power. Uses low-power systems with wireless/distributed wireless charging or ambient energy harvesting (solar, hydro, geo) |
Physical access to sensors | Usually, nodes are at infrastructure that would be indoors or fenced off, with only authorized access permitted | Much easier to gain access to some sensors, as many are in open, easy-to-access fields/rivers |
Attack Type | Factory 4.0 | Agriculture 4.0 | Parameter/Countermeasure |
---|---|---|---|
Access | High risk, as attackers will try to gain network access | High risk, as attackers will try to gain network access | Use authentication methods, e.g., fingerprinting. Monitor communications and data |
Reputation | Dependent on trust model used | Dependent on trust model used—could be more common, as there may be a greater need for multi-hop networks over the large areas | If used, monitor recommendation trust values carefully and check for errors in reported values [24] |
DoS | Communication DoS potentially more common, as devices will typically be less resource-constrained | Resource-draining in low-power nodes will cause them to die | Monitor comms and resource consumption |
Payload | Dangerous in any network once attacker has access | Dangerous in any network once attacker has access | Monitor data/comms/resource consumption/memory integrity etc. |
Routing | Depends on network topology | Potentially more vulnerable if multi-hop/larger networks are being used | Monitor comms - packet forwarding rates/successful interactions etc. |
Physical | nodes may be difficult to gain physical access to | Nodes will often not be difficult to access | Try to minimize physical access to nodes, flag if a node has gone offline, disable any input ports on node device |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mannix, K.; Gorey, A.; O’Shea, D.; Newe, T. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them. J. Sens. Actuator Netw. 2022, 11, 43. https://doi.org/10.3390/jsan11030043
Mannix K, Gorey A, O’Shea D, Newe T. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them. Journal of Sensor and Actuator Networks. 2022; 11(3):43. https://doi.org/10.3390/jsan11030043
Chicago/Turabian StyleMannix, Kealan, Aengus Gorey, Donna O’Shea, and Thomas Newe. 2022. "Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them" Journal of Sensor and Actuator Networks 11, no. 3: 43. https://doi.org/10.3390/jsan11030043
APA StyleMannix, K., Gorey, A., O’Shea, D., & Newe, T. (2022). Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them. Journal of Sensor and Actuator Networks, 11(3), 43. https://doi.org/10.3390/jsan11030043