• DocumentCode
    2096475
  • Title

    Dishonest recommendation attacks in wireless sensor networks: A survey

  • Author

    Khedim, Farah ; Labraoui, Nabila ; Lehsaini, Mohamed

  • Author_Institution
    STIC Laboratory University of Tlemcen Algeria
  • fYear
    2015
  • fDate
    28-30 April 2015
  • Firstpage
    1
  • Lastpage
    10
  • Abstract
    Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.
  • Keywords
    Monitoring; Peer-to-peer computing; Protocols; Security; Transmission line measurements; Wireless sensor networks; Security; Trust and reputation systems; WSN; attacks; bad mouthing; ballot stuffing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Programming and Systems (ISPS), 2015 12th International Symposium on
  • Conference_Location
    Algiers, Algeria
  • Type

    conf

  • DOI
    10.1109/ISPS.2015.7244964
  • Filename
    7244964