DocumentCode :
2096475
Title :
Dishonest recommendation attacks in wireless sensor networks: A survey
Author :
Khedim, Farah ; Labraoui, Nabila ; Lehsaini, Mohamed
Author_Institution :
STIC Laboratory University of Tlemcen Algeria
fYear :
2015
fDate :
28-30 April 2015
Firstpage :
1
Lastpage :
10
Abstract :
Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.
Keywords :
Monitoring; Peer-to-peer computing; Protocols; Security; Transmission line measurements; Wireless sensor networks; Security; Trust and reputation systems; WSN; attacks; bad mouthing; ballot stuffing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Programming and Systems (ISPS), 2015 12th International Symposium on
Conference_Location :
Algiers, Algeria
Type :
conf
DOI :
10.1109/ISPS.2015.7244964
Filename :
7244964
Link To Document :
بازگشت