DocumentCode
2096475
Title
Dishonest recommendation attacks in wireless sensor networks: A survey
Author
Khedim, Farah ; Labraoui, Nabila ; Lehsaini, Mohamed
Author_Institution
STIC Laboratory University of Tlemcen Algeria
fYear
2015
fDate
28-30 April 2015
Firstpage
1
Lastpage
10
Abstract
Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.
Keywords
Monitoring; Peer-to-peer computing; Protocols; Security; Transmission line measurements; Wireless sensor networks; Security; Trust and reputation systems; WSN; attacks; bad mouthing; ballot stuffing;
fLanguage
English
Publisher
ieee
Conference_Titel
Programming and Systems (ISPS), 2015 12th International Symposium on
Conference_Location
Algiers, Algeria
Type
conf
DOI
10.1109/ISPS.2015.7244964
Filename
7244964
Link To Document